Ch01 - Information Security Fundamentals

Ch01 - Information Security Fundamentals -...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Information Security Fundamentals Information Security Fundamentals Security+ Guide to Network Security Fundamentals  Second Edition Chapter 1 Chapter 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Important Terms Asset COPPA – Children’s Online Privacy Protection Act CDSBA – California Database Security Breach Act Cyberterrorism Exploit GLBA – Gramm-Leach-Bliley Act Information Security Patch Risk Sarbanes-Oxley Act – Sarbox Threat Threat Agent USA Patriot Act vulnerability
Background image of page 2
3 Objectives Identify the challenges for information security Define information security Explain the importance of information security List and define information security terminology Describe the CompTIA Security+ certification exam Describe information security careers
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Challenge of keeping networks and computers secure  has never been greater A number of trends illustrate why security is becoming  increasingly difficult Many trends have resulted in security attacks growing  at an alarming rate Identifying the Challenges for Information  Security
Background image of page 4
5 Computer Emergency Response Team (CERT)  security organization compiles statistics regarding  number of reported attacks, including: Speed of attacks Sophistication of attacks Faster detection of weaknesses Distributed attacks Difficulties of patching Identifying the Challenges for Information  Security (continued)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Identifying the Challenges for Information  Security (continued)
Background image of page 6
7 Identifying the Challenges for Information  Security (continued)
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Information security:  Tasks of guarding digital information, which is  typically processed by a computer (such as a  personal computer), stored on a magnetic or optical  storage device (such as a hard drive or DVD), and  transmitted over a network spacing Ensures that protective measures are properly 
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/28/2010 for the course NETWORK SE Security + taught by Professor None during the Three '10 term at University of Sydney.

Page1 / 24

Ch01 - Information Security Fundamentals -...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online