SlideShare a Scribd company logo
1 of 21
‫اتجاهات‬‫حديثة‬‫لتقنية‬‫المعلومات‬
‫.د‬ ‫أنور‬‫فتح‬‫الرحمن‬‫أحمد‬‫دفع‬‫هللا‬
‫استاذ‬‫مساعد‬‫ببرنامج‬‫أمن‬‫المعلومات‬،‫قسم‬‫البرامج‬
‫الدولية‬‫التطبيقية‬،‫كلية‬‫الدراسات‬‫التطبيقية‬‫وخدمة‬
‫المجتمع‬،‫جامع‬‫الملك‬‫فيصل‬،‫اإلحساء‬ – ‫السعودية‬
‫جامعة‬‫البحر‬‫األحمر‬،‫بورتسودان‬
23 ‫5102ديسمبر‬
Adafaalla@KFU.EDU.SA
Background
• Born & raised in Daim Shati, PortSudan <3
• Graduated from AASTMT – Alex-Egypt
• Participated in the AOI2002, IOI2002 & Founded
SOI2003
• Co-Founded SudaDev 2002
• Founded TEDx in Sudan
• Founded Sudanese Researchers Initiative
• Co-founded OLPC-to-Sudan
• Member, #Lift_US_Sanctions/ #TechSanctions
on Sudan
• Founder #Nafeer_IT
• Challenges & Opportunities
• U.S. Sanctions on Sudan
• Entrepreneurship
Principals of Information Security, Fourth Edition 3
What’s HOT?
4
Information security
• Information security: a “well-informed sense of
assurance that the information risks and controls
are in balance.” — Jim Anderson, Inovant (2002)
• Security professionals must review the origins of
this field to understand its impact on our
understanding of information security today
Principles of Information Security, Fourth Edition 8
What is Security?
• “The quality or state of being secure—to be free
from danger”
• A successful organization should have multiple
layers of security in place:
– Physical security
– Personal security
– Operations security
– Communications security
– Network security
– Information security
9Principles of Information Security, Fourth Edition
What is Security? (cont’d.)
• The protection of information and its critical
elements, including systems and hardware that
use, store, and transmit that information
• Necessary tools: policy, awareness, training,
education, technology
• C.I.A. triangle
– Was standard based on confidentiality, integrity, and
availability
– Now expanded into list of critical characteristics of
information
Principles of Information Security, Fourth Edition 10
11Principles of Information Security, Fourth Edition
Figure 1-3 Components of Information Security
Key Information Security Concepts
• Access
• Asset
• Attack
• Control, Safeguard, or
Countermeasure
• Exploit
• Exposure
• Loss
12
• Protection Profile or
Security Posture
• Risk
• Subjects and Objects
• Threat
• Threat Agent
• Vulnerability
Principles of Information Security, Fourth Edition
Key Information Security Concepts
(cont’d.)
• Computer can be subject of an attack and/or the
object of an attack
– When the subject of an attack, computer is used as
an active tool to conduct attack
– When the object of an attack, computer is the entity
being attacked
Principles of Information Security, Fourth Edition 13
Principles of Information Security, Fourth Edition 14
Figure 1-4 Information Security Terms
15
Figure 1-5 – Subject and Object of
Attack
Principles of Information Security, Fourth Edition
Figure 1-5 Computer as the Subject and Object of an Attack
Critical Characteristics of Information
• The value of information comes from the
characteristics it possesses:
– Availability
– Accuracy
– Authenticity
– Confidentiality
– Integrity
– Utility
– Possession
Principles of Information Security, Fourth Edition 16
CNSS Security Model
Principles of Information Security, Fourth Edition 17
Figure 1-6 The McCumber Cube
Components of an Information System
• Information system (IS) is entire set of components
necessary to use information as a resource in the
organization
– Software
– Hardware
– Data
– People
– Procedures
– Networks
Principles of Information Security, Fourth Edition 18
Balancing Information Security and
Access
• Impossible to obtain perfect security—it is a
process, not an absolute
• Security should be considered balance between
protection and availability
• To achieve balance, level of security must allow
reasonable access, yet protect against threats
Principles of Information Security, Fourth Edition 19
20
Thank you 
• Questions?
Principals of Information Security, Fourth Edition 21

More Related Content

What's hot

Cyber security and mobile devices
Cyber security and mobile devicesCyber security and mobile devices
Cyber security and mobile devicesUmer Saeed
 
Infromation securiity
Infromation securiityInfromation securiity
Infromation securiityAamir Sohail
 
Security & Privacy - Lecture A
Security & Privacy - Lecture ASecurity & Privacy - Lecture A
Security & Privacy - Lecture ACMDLearning
 
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNBAtlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNBDavid Shipley
 
OTechs Information Security Training Course
OTechs Information Security Training CourseOTechs Information Security Training Course
OTechs Information Security Training CourseOsman Suliman
 

What's hot (10)

Cyber security and mobile devices
Cyber security and mobile devicesCyber security and mobile devices
Cyber security and mobile devices
 
Isys20261 lecture 11
Isys20261 lecture 11Isys20261 lecture 11
Isys20261 lecture 11
 
Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
 
Infromation securiity
Infromation securiityInfromation securiity
Infromation securiity
 
Security & Privacy - Lecture A
Security & Privacy - Lecture ASecurity & Privacy - Lecture A
Security & Privacy - Lecture A
 
Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.
 
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNBAtlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
 
What is it
What is itWhat is it
What is it
 
OTechs Information Security Training Course
OTechs Information Security Training CourseOTechs Information Security Training Course
OTechs Information Security Training Course
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 

Viewers also liked

التأهيل للشهادات الاحترافية
التأهيل للشهادات الاحترافيةالتأهيل للشهادات الاحترافية
التأهيل للشهادات الاحترافيةmohammed al anzi
 
Www.kutub.info 13178
Www.kutub.info 13178Www.kutub.info 13178
Www.kutub.info 13178Elbahi Wadie
 
History of cloud computing
History of cloud computingHistory of cloud computing
History of cloud computingMonsif sakienah
 
كيف نحمي أطفالنا من مخاطر الأنترنت
كيف نحمي أطفالنا من مخاطر الأنترنت كيف نحمي أطفالنا من مخاطر الأنترنت
كيف نحمي أطفالنا من مخاطر الأنترنت Wail Skanderi
 
OLPC to Sudan @ Seoul National University
OLPC to Sudan @ Seoul National UniversityOLPC to Sudan @ Seoul National University
OLPC to Sudan @ Seoul National UniversityAnwar F.A. Dafa-Alla
 
TEDxKhartoum_Press conference 25-4-2011
TEDxKhartoum_Press conference 25-4-2011TEDxKhartoum_Press conference 25-4-2011
TEDxKhartoum_Press conference 25-4-2011Anwar F.A. Dafa-Alla
 
How to Find your Research Idea? KMCA workshop3-1-2012
How to Find your Research Idea? KMCA workshop3-1-2012How to Find your Research Idea? KMCA workshop3-1-2012
How to Find your Research Idea? KMCA workshop3-1-2012Anwar F.A. Dafa-Alla
 
I Am A Ted Volunteer Translator Anour
I Am A Ted Volunteer Translator AnourI Am A Ted Volunteer Translator Anour
I Am A Ted Volunteer Translator AnourAnwar F.A. Dafa-Alla
 
Cover letters-for-academic-positions ( Sudanese Researchers )
Cover letters-for-academic-positions ( Sudanese Researchers ) Cover letters-for-academic-positions ( Sudanese Researchers )
Cover letters-for-academic-positions ( Sudanese Researchers ) Anwar F.A. Dafa-Alla
 
إثراء المحتوى العربي على الإنترنت ، ملتقى النهضة الشبابي
إثراء المحتوى العربي على الإنترنت ، ملتقى النهضة الشبابيإثراء المحتوى العربي على الإنترنت ، ملتقى النهضة الشبابي
إثراء المحتوى العربي على الإنترنت ، ملتقى النهضة الشبابيAnwar F.A. Dafa-Alla
 
TEDxKhartoum @ TEDx Korea organizers workshop
TEDxKhartoum @ TEDx Korea organizers workshop TEDxKhartoum @ TEDx Korea organizers workshop
TEDxKhartoum @ TEDx Korea organizers workshop Anwar F.A. Dafa-Alla
 
My presentation at Freedom House . DC.
My presentation at Freedom House . DC.My presentation at Freedom House . DC.
My presentation at Freedom House . DC.Anwar F.A. Dafa-Alla
 
My Presentation @ Yale university (Youth,Conflict& Governance in Africa)
My Presentation @ Yale university (Youth,Conflict& Governance in Africa)My Presentation @ Yale university (Youth,Conflict& Governance in Africa)
My Presentation @ Yale university (Youth,Conflict& Governance in Africa)Anwar F.A. Dafa-Alla
 
TEDxKhartoum presentation on Sudan: Moving Forward event SAPA 30-11-2013
TEDxKhartoum presentation on Sudan: Moving Forward event SAPA 30-11-2013TEDxKhartoum presentation on Sudan: Moving Forward event SAPA 30-11-2013
TEDxKhartoum presentation on Sudan: Moving Forward event SAPA 30-11-2013Anwar F.A. Dafa-Alla
 
Tedx Khartoum @Khartoum Geeks trailer_12-3-2011
Tedx Khartoum @Khartoum Geeks trailer_12-3-2011Tedx Khartoum @Khartoum Geeks trailer_12-3-2011
Tedx Khartoum @Khartoum Geeks trailer_12-3-2011Anwar F.A. Dafa-Alla
 
ألية استخدام الهواتف الذكية
ألية استخدام الهواتف الذكيةألية استخدام الهواتف الذكية
ألية استخدام الهواتف الذكيةHazem Al Rekhawi
 

Viewers also liked (20)

التأهيل للشهادات الاحترافية
التأهيل للشهادات الاحترافيةالتأهيل للشهادات الاحترافية
التأهيل للشهادات الاحترافية
 
Www.kutub.info 13178
Www.kutub.info 13178Www.kutub.info 13178
Www.kutub.info 13178
 
شهادة الأمن
شهادة الأمنشهادة الأمن
شهادة الأمن
 
Cissp
CisspCissp
Cissp
 
History of cloud computing
History of cloud computingHistory of cloud computing
History of cloud computing
 
كيف نحمي أطفالنا من مخاطر الأنترنت
كيف نحمي أطفالنا من مخاطر الأنترنت كيف نحمي أطفالنا من مخاطر الأنترنت
كيف نحمي أطفالنا من مخاطر الأنترنت
 
OLPC to Sudan @ Seoul National University
OLPC to Sudan @ Seoul National UniversityOLPC to Sudan @ Seoul National University
OLPC to Sudan @ Seoul National University
 
TEDxKhartoum_Press conference 25-4-2011
TEDxKhartoum_Press conference 25-4-2011TEDxKhartoum_Press conference 25-4-2011
TEDxKhartoum_Press conference 25-4-2011
 
OLPC to Sudan
OLPC to SudanOLPC to Sudan
OLPC to Sudan
 
How to Find your Research Idea? KMCA workshop3-1-2012
How to Find your Research Idea? KMCA workshop3-1-2012How to Find your Research Idea? KMCA workshop3-1-2012
How to Find your Research Idea? KMCA workshop3-1-2012
 
I Am A Ted Volunteer Translator Anour
I Am A Ted Volunteer Translator AnourI Am A Ted Volunteer Translator Anour
I Am A Ted Volunteer Translator Anour
 
Cover letters-for-academic-positions ( Sudanese Researchers )
Cover letters-for-academic-positions ( Sudanese Researchers ) Cover letters-for-academic-positions ( Sudanese Researchers )
Cover letters-for-academic-positions ( Sudanese Researchers )
 
إثراء المحتوى العربي على الإنترنت ، ملتقى النهضة الشبابي
إثراء المحتوى العربي على الإنترنت ، ملتقى النهضة الشبابيإثراء المحتوى العربي على الإنترنت ، ملتقى النهضة الشبابي
إثراء المحتوى العربي على الإنترنت ، ملتقى النهضة الشبابي
 
TEDxKhartoum @ TEDx Korea organizers workshop
TEDxKhartoum @ TEDx Korea organizers workshop TEDxKhartoum @ TEDx Korea organizers workshop
TEDxKhartoum @ TEDx Korea organizers workshop
 
My presentation at Freedom House . DC.
My presentation at Freedom House . DC.My presentation at Freedom House . DC.
My presentation at Freedom House . DC.
 
My Presentation @ Yale university (Youth,Conflict& Governance in Africa)
My Presentation @ Yale university (Youth,Conflict& Governance in Africa)My Presentation @ Yale university (Youth,Conflict& Governance in Africa)
My Presentation @ Yale university (Youth,Conflict& Governance in Africa)
 
TEDxKhartoum presentation on Sudan: Moving Forward event SAPA 30-11-2013
TEDxKhartoum presentation on Sudan: Moving Forward event SAPA 30-11-2013TEDxKhartoum presentation on Sudan: Moving Forward event SAPA 30-11-2013
TEDxKhartoum presentation on Sudan: Moving Forward event SAPA 30-11-2013
 
Tedx Khartoum @Khartoum Geeks trailer_12-3-2011
Tedx Khartoum @Khartoum Geeks trailer_12-3-2011Tedx Khartoum @Khartoum Geeks trailer_12-3-2011
Tedx Khartoum @Khartoum Geeks trailer_12-3-2011
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
ألية استخدام الهواتف الذكية
ألية استخدام الهواتف الذكيةألية استخدام الهواتف الذكية
ألية استخدام الهواتف الذكية
 

Similar to My Pres @ Red Sea_university 23-12-2015

1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptxdiaa46
 
1 info sec+risk-mgmt
1 info sec+risk-mgmt1 info sec+risk-mgmt
1 info sec+risk-mgmtmadunix
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
IS-Intro.pdf
IS-Intro.pdfIS-Intro.pdf
IS-Intro.pdfwdwd10
 
Week 1 - Introduction to Information Security.pptx
Week 1 - Introduction to Information Security.pptxWeek 1 - Introduction to Information Security.pptx
Week 1 - Introduction to Information Security.pptxChristianEarlPalason
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfVishwanathMahalle
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.IGN MANTRA
 
1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt1 Info Sec+Risk Mgmt
1 Info Sec+Risk MgmtAlfred Ouyang
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfssuserf98dd4
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
 

Similar to My Pres @ Red Sea_university 23-12-2015 (20)

1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptx
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
1 info sec+risk-mgmt
1 info sec+risk-mgmt1 info sec+risk-mgmt
1 info sec+risk-mgmt
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
ISM Chapter 1.ppt
ISM Chapter 1.pptISM Chapter 1.ppt
ISM Chapter 1.ppt
 
9780840024220 ppt ch01
9780840024220 ppt ch019780840024220 ppt ch01
9780840024220 ppt ch01
 
IS-Intro.pdf
IS-Intro.pdfIS-Intro.pdf
IS-Intro.pdf
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
Week 1 - Introduction to Information Security.pptx
Week 1 - Introduction to Information Security.pptxWeek 1 - Introduction to Information Security.pptx
Week 1 - Introduction to Information Security.pptx
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
 
1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt
 
Is ch1 (2)
Is ch1 (2)Is ch1 (2)
Is ch1 (2)
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
 
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and TrainingPACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and Training
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

My Pres @ Red Sea_university 23-12-2015

  • 2. Background • Born & raised in Daim Shati, PortSudan <3 • Graduated from AASTMT – Alex-Egypt • Participated in the AOI2002, IOI2002 & Founded SOI2003 • Co-Founded SudaDev 2002 • Founded TEDx in Sudan • Founded Sudanese Researchers Initiative • Co-founded OLPC-to-Sudan • Member, #Lift_US_Sanctions/ #TechSanctions on Sudan • Founder #Nafeer_IT
  • 3. • Challenges & Opportunities • U.S. Sanctions on Sudan • Entrepreneurship Principals of Information Security, Fourth Edition 3
  • 5.
  • 6.
  • 7.
  • 8. Information security • Information security: a “well-informed sense of assurance that the information risks and controls are in balance.” — Jim Anderson, Inovant (2002) • Security professionals must review the origins of this field to understand its impact on our understanding of information security today Principles of Information Security, Fourth Edition 8
  • 9. What is Security? • “The quality or state of being secure—to be free from danger” • A successful organization should have multiple layers of security in place: – Physical security – Personal security – Operations security – Communications security – Network security – Information security 9Principles of Information Security, Fourth Edition
  • 10. What is Security? (cont’d.) • The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information • Necessary tools: policy, awareness, training, education, technology • C.I.A. triangle – Was standard based on confidentiality, integrity, and availability – Now expanded into list of critical characteristics of information Principles of Information Security, Fourth Edition 10
  • 11. 11Principles of Information Security, Fourth Edition Figure 1-3 Components of Information Security
  • 12. Key Information Security Concepts • Access • Asset • Attack • Control, Safeguard, or Countermeasure • Exploit • Exposure • Loss 12 • Protection Profile or Security Posture • Risk • Subjects and Objects • Threat • Threat Agent • Vulnerability Principles of Information Security, Fourth Edition
  • 13. Key Information Security Concepts (cont’d.) • Computer can be subject of an attack and/or the object of an attack – When the subject of an attack, computer is used as an active tool to conduct attack – When the object of an attack, computer is the entity being attacked Principles of Information Security, Fourth Edition 13
  • 14. Principles of Information Security, Fourth Edition 14 Figure 1-4 Information Security Terms
  • 15. 15 Figure 1-5 – Subject and Object of Attack Principles of Information Security, Fourth Edition Figure 1-5 Computer as the Subject and Object of an Attack
  • 16. Critical Characteristics of Information • The value of information comes from the characteristics it possesses: – Availability – Accuracy – Authenticity – Confidentiality – Integrity – Utility – Possession Principles of Information Security, Fourth Edition 16
  • 17. CNSS Security Model Principles of Information Security, Fourth Edition 17 Figure 1-6 The McCumber Cube
  • 18. Components of an Information System • Information system (IS) is entire set of components necessary to use information as a resource in the organization – Software – Hardware – Data – People – Procedures – Networks Principles of Information Security, Fourth Edition 18
  • 19. Balancing Information Security and Access • Impossible to obtain perfect security—it is a process, not an absolute • Security should be considered balance between protection and availability • To achieve balance, level of security must allow reasonable access, yet protect against threats Principles of Information Security, Fourth Edition 19
  • 20. 20
  • 21. Thank you  • Questions? Principals of Information Security, Fourth Edition 21