chapter01
13 Pages

chapter01

Course Number: IS 2820, Spring 2010

College/University: Webber

Word Count: 2731

Rating:

Document Preview

Management of Information Security 1-1 Chapter 1 Introduction to the Management of Information Security Chapter Overview The opening chapter establishes the foundation for understanding the field of Information Security. This is accomplished by explaining the importance of information technology and defining who is responsible for protecting an organizations information assets. In this chapter the student will...

Unformatted Document Excerpt
Coursehero >> Florida >> Webber >> IS 2820

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Management of Information Security 1-1 Chapter 1 Introduction to the Management of Information Security Chapter Overview The opening chapter establishes the foundation for understanding the field of Information Security. This is accomplished by explaining the importance of information technology and defining who is responsible for protecting an organizations information assets. In this chapter the student will come to know and understand the definition and key characteristics of information security as well as the come to recognize the characteristics that differentiate information security management from general management. Chapter Objectives When you complete this chapter, you will be able to: Recognize the importance of information technology and understand who is responsible for protecting an organizations information assets Know and understand the definition and key characteristics of information security Know and understand the definition and key characteristics of leadership and management Recognize the characteristics that differentiate information security management from general management INTRODUCTION Information technology is the vehicle that stores and transports informationa companys most valuable resourcefrom one business unit to another. But what happens if the vehicle breaks down, even for a little while? As businesses have become more fluid, the concept of computer security has been replaced by the concept of information security. Because this new concept covers a broader range of issues, from the protection of data to the protection of human resources, information security is no longer the sole responsibility of a discrete group of people in the company; rather, it is the responsibility of every employee, and especially managers.

Textbooks related to the document above:

Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

Webber - IS - 2820
Management of Information Security1-1Chapter 1 Key TermsAccountability Authentication Authorization Availability C.I.A. triangle Communications security Confidentiality Control Control tools Decisional role File hashing General business community Goal
Webber - IS - 2813
TEL2813/IS2820 Security ManagementLecture 1 Jan 6, 2005 Contact James Joshi 721, IS Building Phone: 4126249982 Email: jjoshi@mail.sis.pitt.edu Web: /~jjoshi/TELCOM2813/Spring2005/ Office Hours: Wednesdays: 1.00 3.00 p.m. or By appointments GSA: w
Webber - IS - 2813
TEL2813/IS2820 Security ManagementSecurity PlanningLecture 2 Jan 13, 2005 Security PlanningYou got to be careful if you don't know where you're going, because you might not get there. Yogi Berra Introduction Successful organizations utilize
Webber - IS - 2813
TEL2813/IS2820 Security ManagementDeveloping the Security Program Jan 27, 2005 IntroductionSome organizations use security programsInformation security program to describe the entire set of personnel, plans, policies, and initiatives related to info
Webber - IS - 2813
TEL2813/IS2820 Security ManagementRisk Management: Identifying and Assessing Risk Lecture 7 Feb 17, 2005 Introduction Information security departments are created primarily to manage IT risk Managing risk is one of the key responsibilities of every m
Webber - IS - 2813
TEL2813/IS2820 Security ManagementProtection Mechanisms Lecture 9 Feb 24, 2005 Introduction (Continued)Some of the most powerful and widely used technical security mechanisms include: Access controls Firewalls Dialup protection Intrusion detect
Webber - IS - 2813
TEL2813/IS2820 Security ManagementSystems/Evaluations Lecture 11 April 7, 2005 Access control matrixObjects File 1 User 1 User 2 User 3 Subjects File 2 write write writeFile 3 write write read . read write writeFile n read readread write .
Ashford University - ACC - 306
Chapter 20 Earnings Per ShareQuestions for Review of Key TopicsQuestion 20-1A firm has a simple capital structure if it has no potentially dilutive securities outstanding. These are securities that are not yet common stock, but might become common stoc
American Academy of Art - PHYS - 133
Pre-lab Exercises Directions: For each lab, write a brief summary and include the following: 1. Title of lab 2. Objective(s) 3. Methods, including the organisms with which we will be working (two or three sentences should be sufficient) 4. Safety Concerns
NED Univ. of Engineering & Tech. - MECH - ME101
Extrusion: The Definitive Processing Guide and HandbookbyHarold F. Giles, Jr. John R. Wagner, Jr. Crescent Associates, Inc. Rochester, New York Eldridge M. Mount, III EMMOUNT Technologies Fairport, New YorkCopyright 2005 by William Andrew, Inc. No part
UCF - ZOO - 3733
Week 1 anatomy lab assignment1- Introduction to the lab (by GTAs/ TAs) 2- Review the lab syllabus quickly 3- Review the week 1 lab learning material from the lab syllabus 4- Find the structures on pictures, posters, and anatomical models using your lab A
NYU Poly - ME - ME4906
Lecture NotesME4906, Mechanical Engineering, PolyU2008/2009Chapter 5 Partial Differential Equations and Finite Difference Methods5.1 Finite DifferenceTaylors Expansion (Revisit)f ( x i + 1 ) = f ( x i ) + f ( x i )( x i + 1 x i ) + df dx f ( x i ) (
NYU Poly - ME - ME4906
SUBJECT DESCRIPTION_ Subject Title :Numerical Methods for Product AnalysisInstructor: Dr. G. P. Zheng, Department of Mechanical Engineering, Hong Kong PolyU. (E-mail): mmzheng@polyu.edu.hk, (Tel): 27666660 Objectives (Part II of the course): At the end
NYU Poly - ME - ME4906
Assignment #1 ME4906 Numerical Methods for Product Analysis (Deadline for submission: 01 April 2009, 10:00pm)(Mar 18, 2009)1. The temperature T of a rod depends on time (t) and position (x) and can be described as a function of t and x:T ( x, t ) = sin
NYU Poly - ME - ME4906
Lecture NotesME4906, Mechanical Engineering, PolyU2008/2009Chapter 5 Partial Differential Equations and Finite Difference Methods5.2 PDE of 1D Heat Transfer Problem5.2.1 Governing Equation and Analytical SolutionConsider an element (materials) of wi
NYU Poly - ME - ME4906
Lab Report (ME4906)Student Name_Student ID _1. Calculate the first derivative and its absolute error off ( x) = sin x x3at x=4 using the forward 2nd-order finite difference scheme with intervals h=0.1, 0.01, 0.001, and 0.0001.h f Error 0.1 0.01 0.00
NYU Poly - ME - ME4906
Tutorial questions: Chapter 5 EX1. Determine the types of the following PDEs(a) (b) Ans.T 2T =k 2 t x 2T 2T + =0 2x 2 y(a) Parabolic PDE.(b) Elliptic PDE 2u = 2 u 2u 2u + + 2 x 2 y 2zEX2. Calculate the partial differentiationof the following funct
NYU Poly - ME - ME4906
Solution to Class Test held on 4 March 20091. (a) B1= max(17, 21, 15) = 21,B= max(10, 6, 37) = 37.(b) Using the given value B 1= 2/7, we havecond (B, ) = BB 1= 37 (2/7) = 74/7.The system is therefore not ill-conditioned.2.Let Fk = f (k) (a)hk
NYU Poly - ME - ME4906
Chapter 5.3Finite Difference for PDE of 1D in Space Parabolic equations are employed to characterize time-variable (unsteady-state) problems. Conservation of energy can be used to develop an unsteady-state energy balance for the differential element in
NYU Poly - ME - ME4906
Lecture NotesME4906, Mechanical Engineering, PolyU2008/20095.3 Finite Difference for PDE of 1D in Space5.3.1 Explicit SchemeConsider the problem of 1D unsteady heat transfer defined below,T 2T = 2 t xThe solution domain is two-dimensional, space x
NYU Poly - ME - ME4906
Solution: 1. (a)22 22 T = sin(nx ) e 4 n t [4n 2 2 ] = 4n 2 2 sin(nx ) e 4n t t(b)22 22 T = cos(nx ) [n ] e 4 n t = n cos(nx ) e 4 n t x 22 2T T = ( ) = [n cos(nx ) e 4 n t ] x x 2 x x= n 2 2 sin(nx ) e 4 n (c) T 2T 4 2 t x22t= 4n 2 2 sin(nx ) e
NYU Poly - ME - ME4906
Lecture NotesME4906, Mechanical Engineering, PolyU2008/20095.3.2 Implicit SchemeIt has been shown that numerical instability occurs due to the explicit scheme. An implicit scheme is constructed as follows to avoid such instability of finite difference
NYU Poly - ME - ME4906
Chapter 6 Finite-Element Method Finite element method (FEM) provides an alternative to finite-difference (FD) methods, especially for systems with irregular geometry, unusual boundary conditions, or heterogeneous composition. This method divides the solu
NYU Poly - ME - ME4906
ME4906 Revision Questions (Part II)Chapter 5 1. 2. 3. 4. 5. 6. How is partial differentiation defined? EX2 of tutorial questions Give an example for parabolic and elliptic PDEs respectively. EX1 of tutorial questions EX2 of tutorial questions Give an exa
NYU Poly - ME - ME4906
Tutorial questions: Chapter 5 EX1. Determine the types of the following PDEs(a) (b) Ans.T 2T =k 2 t x 2T 2T + =0 2x 2 y(a) Parabolic PDE.(b) Elliptic PDE 2u = 2u 2u 2u + + 2x 2 y 2zEX2. Calculate the partial differentiationof the following functio
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410
NYU Poly - ME - ISE410