week01 - ITC482 Computer Management& Security Week 01...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ITC482 Computer Management & Security Week 01 ITC482 Computer Management & Security Management of Information Security, 2nd ed. - Chapter 1 Slide 2 Learning Objectives ♦ Upon completion of this chapter, you should be able to: – Recognize the importance of information technology and understand who is responsible for protecting an organization’s information assets – Know and understand the definition and key characteristics of information security – Know and understand the definition and key characteristics of leadership and management – Recognize the characteristics that differentiate information security management from general management Management of Information Security, 2nd ed. - Chapter 1 Slide 3 Introduction ♦ Information technology is critical to business and society ♦ Computer security is evolving into information security ♦ Information security is the responsibility of every member of an organization, but managers play a critical role Management of Information Security, 2nd ed. - Chapter 1 Slide 4 Introduction (continued) ♦ Information security involves three distinct communities of interest: – Information security managers and professionals – Information technology managers and professionals – Nontechnical business managers and professionals Management of Information Security, 2nd ed. - Chapter 1 Slide 5 Communities of Interest ♦ InfoSec community: protect information assets from threats ♦ IT community: support business objectives by supplying appropriate information technology ♦ Business community: policy and resources Management of Information Security, 2nd ed. - Chapter 1 Slide 6 What Is Security? ♦ “The quality or state of being secure—to be free from danger” ♦ Security is achieved using several strategies simultaneously Management of Information Security, 2nd ed. - Chapter 1 Slide 7 Specialized Areas of Security ♦ Physical security ♦ Personal security ♦ Operations security ♦ Communications security ♦ Network security ♦ Information security (InfoSec) ♦ Computer security Management of Information Security, 2nd ed. - Chapter 1 Slide 8 Information Security ♦ InfoSec includes information security management, computer security, data security, and network security ♦ Policy is central to all information security efforts Management of Information Security, 2nd ed. - Chapter 1 Slide 9 Figure 1-1 Components of Information Security Management of Information Security, 2nd ed. - Chapter 1 Slide 10 CIA Triangle ♦ The C.I.A. triangle is made up of: – Confidentiality – Integrity – Availability ♦ Over time the list of characteristics has expanded, but these three remain central Management of Information Security, 2nd ed. - Chapter 1 Slide 11 Figure 1-2 NSTISSC Security Model Management of Information Security, 2nd ed. - Chapter 1 Slide 12 Key Concepts of Information Security Confidentiality ♦ Confidentiality – Confidentiality of information ensures that only those with sufficient privileges may access...
View Full Document

This note was uploaded on 02/15/2010 for the course ITC 594 taught by Professor Peterdalmaris during the Three '10 term at Charles Sturt University.

Page1 / 24

week01 - ITC482 Computer Management& Security Week 01...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online