OBJECTIVES: At the end of the presentation, students will be able to learn; define Information Assurance & Security; learn the principles in information security; learn the different information security threats; Identify & apply the different security tools/ softwares; demonstrate simple security protection using the different tools.
Information Assurance- encompasses the protection of information from an Unauthorized access, use, disclosure, disruption, and modification. Information Assurance Information Security- involves safeguarding data integrity, confidentiality, and availability. It is essential to recognize the threats posed by cyber attacks, data Breaches, and insider threats. Information Security
Information Assurance- encompasses the protection of information from an Unauthorized access, use, disclosure, disruption, and modification. Information Assurance Information Security- involves safeguarding data integrity, confidentiality, and availability. It is essential to recognize the threats posed by cyber attacks, data Breaches, and insider threats. Information Security
Is the protection of the system’s ability to make software systems and data fully available when a user needs it. Consistency includes protection against unauthorized changes (addition, deletion, alterations, etc.) to data. The principle of integrity ensures that data is accurate and reliable and is not modified incorrectly, whether accidentally or maliciously. Measures are designed to prevent unauthorized disclosure of information. The purpose of the confidentiality principle is to keep personal i nformation private and to ensure that it is visible and accessible only to those i ndividuals who own it or need it to perform their organizational functions. 3 Principles of Information Security The basic tenets of information security are confidentiality, integrity, and availability. Together they are called as CIA Triad. CONFIDENTIALITY INTEGRITY AVAILABILITY
Is the protection of the system’s ability to make software systems and data fully available when a user needs it. Consistency includes protection against unauthorized changes (addition, deletion, alterations, etc.) to data. The principle of integrity ensures that data is accurate and reliable and is not modified incorrectly, whether accidentally or maliciously. CONFIDENTIALITY Measures are designed to prevent unauthorized disclosure of information. The purpose of the confidentiality principle is to keep personal i nformation private and to ensure that it is visible and accessible only to those i ndividuals who own it or need it to perform their organizational functions. 3 Principles of Information Security The basic tenets of information security are confidentiality, integrity, and availability. Together they are called as CIA Triad. INTEGRITY AVAILABILITY
Is the protection of the system’s ability to make software systems and data fully available when a user needs it. INTEGRITY Consistency includes protection against unauthorized changes (addition, deletion, alterations, etc.) to data. The principle of integrity ensures that data is accurate and reliable and is not modified incorrectly, whether accidentally or maliciously. Measures are designed to prevent unauthorized disclosure of information. The purpose of the confidentiality principle is to keep personal i nformation private and to ensure that it is visible and accessible only to those i ndividuals who own it or need it to perform their organizational functions. CONFIDENTIALITY 3 Principles of Information Security The basic tenets of information security are confidentiality, integrity, and availability. Together they are called as CIA Triad. AVAILABILITY
AVAILABILITY Is the protection of the system’s ability to make software systems and data fully available when a user needs it. Consistency includes protection against unauthorized changes (addition, deletion, alterations, etc.) to data. The principle of integrity ensures that data is accurate and reliable and is not modified incorrectly, whether accidentally or maliciously. INTEGRITY Measures are designed to prevent unauthorized disclosure of information. The purpose of the confidentiality principle is to keep personal i nformation private and to ensure that it is visible and accessible only to those i ndividuals who own it or need it to perform their organizational functions. CONFIDENTIALITY 3 Principles of Information Security The basic tenets of information security are confidentiality, integrity, and availability. Together they are called as CIA Triad.
Social Media Attacks- Attackers can launch attacks directly via social media , for example by spreading malware via social media messages. Social Engineering- Involve attackers sending emails and messages that trick users into performing actions that may compromise their security. Example is ILOVEYOU virus. Different Malwares and Viruses infecting our computers ; Trojan horse, Rootkits, Ransomware, Adware, Spyware, etc. Lack of Encryption- Encryption processes encode data so that it can only be decoded by users with secret keys. INFORMATION SECURITY THREATS There are hundred of categories of information security threats and millions of Known threat vectors. Below are some of them:
Social Media Attacks- Attackers can launch attacks directly via social media , for example by spreading malware via social media messages. Social Engineering- Involve attackers sending emails and messages that trick users into performing actions that may compromise their security. Example is ILOVEYOU virus. Different Malwares and Viruses infecting our computers ; Trojan horse, Rootkits, Ransomware, Adware, Spyware, etc. Lack of Encryption- Encryption processes encode data so that it can only be decoded by users with secret keys. INFORMATION SECURITY THREATS There are hundred of categories of information security threats and millions of Known threat vectors. Below are some of them:
Helps you monitor, block, and remove viruses as well as other malware from your computer and other IT systems. Ex: Kaspersky, BitDefender, McAfee, Norton, Avast, Etc. Prevent unauthorized users from accessing the company intranet and can Be implemented as hardware, software, or a hybrid of the two. EX: Azure firewall, Proxy Firewall, Packet Filtering, etc Decode or encode streams of data that are at rest or in transit, Making them safe and unreadable by unauthorized individuals. Ex: BitLocker, 7-Zip, NordLocker, etc. Are used to identify external network threats by detecting and preventing attacks that originate from the organization’s intranet. Ex: Wireshark, Firewall, Nessus, SolarWinds, etc. ANTIVIRUS SOFTWARE FIREWALL ENCRYPTION TOOLS NETWORK SECURITY & MONITORING TOOLS COMMON SECURITY TOOLS
Helps you monitor, block, and remove viruses as well as other malware from your computer and other IT systems. Ex: Kaspersky, BitDefender, McAfee, Norton, Avast, Etc. Prevent unauthorized users from accessing the company intranet and can Be implemented as hardware, software, or a hybrid of the two. EX: Azure firewall, Proxy Firewall, Packet Filtering, etc Decode or encode streams of data that are at rest or in transit, Making them safe and unreadable by unauthorized individuals. Ex: BitLocker, 7-Zip, NordLocker, etc. Are used to identify external network threats by detecting and preventing attacks that originate from the organization’s intranet. Ex: Wireshark, Firewall, Nessus, SolarWinds, etc. ANTIVIRUS SOFTWARE FIREWALL ENCRYPTION TOOLS NETWORK SECURITY & MONITORING TOOLS COMMON SECURITY TOOLS
Helps you monitor, block, and remove viruses as well as other malware from your computer and other IT systems. Ex: Kaspersky, BitDefender, McAfee, Norton, Avast, Etc. Prevent unauthorized users from accessing the company intranet and can Be implemented as hardware, software, or a hybrid of the two. EX: Azure firewall, Proxy Firewall, Packet Filtering, etc Decode or encode streams of data that are at rest or in transit, Making them safe and unreadable by unauthorized individuals. Ex: BitLocker, 7-Zip, NordLocker, etc. Are used to identify external network threats by detecting and preventing attacks that originate from the organization’s intranet. Ex: Wireshark, Firewall, Nessus, SolarWinds, etc. ANTIVIRUS SOFTWARE FIREWALL ENCRYPTION TOOLS NETWORK SECURITY & MONITORING TOOLS COMMON SECURITY TOOLS
Helps you monitor, block, and remove viruses as well as other malware from your computer and other IT systems. Ex: Kaspersky, BitDefender, McAfee, Norton, Avast, Etc. Prevent unauthorized users from accessing the company intranet and can Be implemented as hardware, software, or a hybrid of the two. EX: Azure firewall, Proxy Firewall, Packet Filtering, etc Decode or encode streams of data that are at rest or in transit, Making them safe and unreadable by unauthorized individuals. Ex: BitLocker, 7-Zip, NordLocker, etc. Are used to identify external network threats by detecting and preventing attacks that originate from the organization’s intranet. Ex: Wireshark, Firewall, Nessus, SolarWinds, etc. ANTIVIRUS SOFTWARE FIREWALL ENCRYPTION TOOLS NETWORK SECURITY & MONITORING TOOLS COMMON SECURITY TOOLS