Introduction to Information Security


Weidman 2014 Recommended textbooks



Download 1,39 Mb.
bet2/44
Sana01.04.2022
Hajmi1,39 Mb.
#522548
1   2   3   4   5   6   7   8   9   ...   44
Bog'liq
CSS

Weidman 2014

Recommended textbooks

  • Cybersecurity for executives : a practical guide / by Gregory J. Touhill and C. Joseph Touhill -2014
  • Kozieł Grzegorz, Information security policy creating, Actual Problems Of Economics - 2011, no 12, vol. 126, pp. 376-380

Computer Systems Security


An introduction to information security

Introduction

  • Information security: a “well-informed sense of assurance that the information risks and controls are in balance.” —Jim Anderson, Inovant (2002)

What is Security?

  • “The quality or state of being secure—to be free from danger”
  • A successful organization should have multiple layers of security in place:
    • Physical security
    • Personal security
    • Operations security
    • Communications security
    • Network security
    • Information security

What is Information Security?

  • The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information
  • Necessary tools: policy, awareness, training, education, technology
  • C.I.A. triangle was standard based on confidentiality, integrity, and availability
  • C.I.A. triangle now expanded into list of critical characteristics of information

Securing Components

  • Computer can be subject of an attack and/or the object of an attack
    • When the subject of an attack, computer is used as an active tool to conduct attack
    • When the object of an attack, computer is the entity being attacked

Components of an Information System
Information System (IS) is entire set of software, hardware, data, people, procedures, and networks necessary to use information as a resource in the organization

Balancing Information Security and Access

  • Impossible to obtain perfect security—it is a process, not an absolute
  • Security should be considered balance between protection and availability
  • To achieve balance, level of security must allow reasonable access, yet protect against threats

Download 1,39 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   44




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish