jagomart
digital resources
picture1_Ppt For Information Security 73322 | 6 2021 05 20!11 45 00 Am


 181x       Filetype PPTX       File size 0.90 MB       Source: uomustansiriyah.edu.iq


File: Ppt For Information Security 73322 | 6 2021 05 20!11 45 00 Am
chapter 1 topics this chapter covers the following topics and concepts what unauthorized access and data breaches are what information systems security is what the tenets of information systems security ...

icon picture PPTX Filetype Power Point PPTX | Posted on 01 Sep 2022 | 3 years ago
Partial capture of text on file.
    Chapter 1 Topics
    This chapter covers the following topics and concepts:
      What unauthorized access and data breaches are
      What information systems security is
      What the tenets of information systems security are
      What the seven domains of an IT infrastructure are
      What the weakest link in an IT infrastructure is
      How an IT security policy framework can reduce risk
      How a data classification standard affects an IT infrastructure’s security 
      needs
    Information Systems Security
      Information security is defined as “protecting information and information 
      systems from unauthorized access, use, disclosure, disruption, modification, 
      or destruction,”according to US law.
      Security means protecting our assets from attackers invading our networks, 
      virus/worms,  natural  disasters,  adverse  environmental  conditions,  power 
      failures, theft, or other undesirable states.
      With the Internet of Things (IoT) now connecting personal devices, home 
      devices, and vehicles to the Internet, there are even more data to steal. All 
      users must defend their information from attackers. 
      
    What are we securing?
        Insecure state
          we can quickly list a number of items that would put us in insecure state:
            Not patching our systems or not patching quickly enough. A patch is a set 
             of  changes  to  a computer  program or  its  supporting  data  designed  to 
             update, fix, or improve it.
            Using weak passwords such as “password” or “12345678”
            Downloading infected programs from the Internet
            Opening dangerous e-mail attachments from unknown senders
            Using wireless networks without encryption that can be monitored by 
             anyone
      Threats, vulnerabilities, and risk
        Threats: have the potential to cause harm to our assets. Threats tend to be 
        specific  to  certain  environments,  particularly  in  the  world  of  information 
        security. For example, although a virus might pose a threat to a Windows 
        operating system, the same virus will be unlikely to have any effect on a 
        Linux operating system.
        Vulnerabilities  are  weaknesses  that  can  be  used  to  harm  our  assets.  A 
        vulnerability might be a specific operating system or application that we are 
        running,  a  physical  location  where  we  have  chosen  to  place  our  office 
        building,  a  data  center  that  is  populated  over  the  capacity  of  its  air-
        conditioning system, a lack of backup generators, or other factors.
The words contained in this file might help you see if this file matches what you are looking for:

...Chapter topics this covers the following and concepts what unauthorized access data breaches are information systems security is tenets of seven domains an it infrastructure weakest link in how policy framework can reduce risk a classification standard affects s needs defined as protecting from use disclosure disruption modification or destruction according to us law means our assets attackers invading networks virus worms natural disasters adverse environmental conditions power failures theft other undesirable states with internet things iot now connecting personal devices home vehicles there even more steal all users must defend their we securing insecure state quickly list number items that would put not patching enough patch set changes computer program its supporting designed update fix improve using weak passwords such password downloading infected programs opening dangerous e mail attachments unknown senders wireless without encryption be monitored by anyone threats vulnerabilit...

no reviews yet
Please Login to review.