SecurityIntro - <?xml version="1.0"...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" ""> <html xmlns=""> <head> <title>Security Introduction</title> <meta name="copyright" content="Copyright &#169; 2008 by Martin B. Wolske" /> <link rel="stylesheet" type="text/css" media="screen, projection, print" href="" /> <script src="" charset="utf-8" type="text/javascript"></script> <link rel="stylesheet" type="text/css" media="screen, projection, print" href="" /> </head> <body> <div class="background"> <img id="head-icon" alt="graphic with four colored squares" src="" /> </div> <div class="slide cover"> <div style="text- align:center;width:60%;position:relative;left:20%;top:20%"> <h1> Security Introduction<br /> LIS 451 * Summer 2008<br /> Introduction to Networked Information Systems<br /> </h1> <p> <a href=""> Martin Wolske, Ph.D.</a> ( <a href=""></a>) </p> </div> </div> <div class="slide" id="OpeningDiscussion"> <h1>Opening Discussion</h1> <ul> <li>What technology-related security incidents have you experienced?</li> <li>How secure is your home computer?</li> <li>What are the biggest threats to security?</li> </ul> </div> <div class="slide" id="ImplementingSecurity"> <h1>Implementing Effective Security</h1> <ul> <li> Unlike frontier communities that over time become more "civilized", the Internet continues to require ever greater vigilance, yet most users would rather not have to think about security at all. </li> <li> Someone needs to know enough about security <em>AND</em> needs to know the organization well enough to plan a security policy balancing usability with
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
security <em>AND</em> have enough time to develop and implement plan <em>AND</em> be able to effectively build a trust with users and managers through strong communication and education efforts </li> <li> The first step in implementing effective security is a good risk assessment: <ul> <li> What am I trying to protect? </li> <li> What am I trying to protect against? </li> <li> What is the likelihood of an attack at each point given the likely attackers? </li> <li> What is the cost for implementing protection at each point? What is the cost of loss and recovery a vulnerability is exploited? <ul> <li>End users time while systems are down; in reproducing lost data</li> <li>IT Staff time to diagnose and recover</li> <li>Hardware/software costs</li> <li>Litigation costs</li> <li>Customer trust</li> </ul> </li> </ul> </li> </ul> </div> <div class="slide" id="WhatIsBeingProtected"> <h1>What Are You Protecting?</h1> <ul> <li> Physical equipment -- it's interesting and sad to see how many highly
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/09/2010 for the course GSLIS LIS451 taught by Professor Martinwolske during the Summer '08 term at University of Illinois at Urbana–Champaign.

Page1 / 19

SecurityIntro - &lt;?xml version=&quot;1.0&quot;...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online