10
Introduction to Information Security

Introduction to Information Security

Embed Size (px)

Citation preview

Page 1: Introduction to Information Security

Introduction to Information Security

Page 2: Introduction to Information Security

Understanding Security• Security is the goal to be free from danger as well as the process

that achieves that freedom

• Security is the necessary steps to protect a person or property from harm.

• This harm may come from one of two sources:• Direct action• Indirect and unintentional action

• Security is sacrificing convenience for safety

Page 3: Introduction to Information Security

Security• Existed since the dawn of time

• The What’s and How’s• What we want to protect• How are we going to do it

• Not a new topic but ever changing with emersion of different valuables and needs

Page 4: Introduction to Information Security

Enter the Digital Age

• Most companies conduct business across the Internet.

• Millions of people perform online transactions every day.

• Vast amounts of money are transferred via networks, in the form of either bank transactions or simple credit card purchases.

Page 5: Introduction to Information Security

Challenges of Securing Information

• Fifty years ago, computers and data were uncommon.

• Computer hardware was a high-value item and security was mainly a physical issue.

• Now, personal computers are ubiquitous and portable, making them much more difficult to secure physically.

• Computers are often connected to the Internet.

• The value of the data on computers often exceeds the value of the equipment.• Transition from Physical Attacks to Virtual ones

• Mainframes Digital World• WaterGate

Page 6: Introduction to Information Security

Defining Security• Computer security is not a simple concept to define.

• If one is referring to a computer, then it can be considered secure when the computer does what it is supposed to do and only what it is supposed to do.

• However, the security emphasis has shifted from the computer to the information being processed.

• Information security is defined by the information being protected from unauthorized access or alteration and yet is available to authorized individuals when required.

Page 7: Introduction to Information Security

Today’s Security Attacks• Balances manipulated on prepaid debit cards

• Home Wi-Fi network attacked

• Social Media accounts exploited

• Web Based Finances

• Ploutus ATM malware

• Exploiting Email Scams

• Manipulate aircraft and ocean vessels

• Electronic data records stolen

Page 8: Introduction to Information Security

Question• What do you believe are reasons why there is an increase in digital

information attacks?• On Individuals• On Businesses

Page 9: Introduction to Information Security

Today’s Security Attacks• Balances manipulated on prepaid debit cards

• Home Wi-Fi network attacked

• Social Media accounts exploited

• Web Based Finances

• Ploutus ATM malware

• Exploiting Email Scams

• Manipulate aircraft and ocean vessels

• Electronic data records stolen

Page 10: Introduction to Information Security

Question:• Do you know what most of today’s security attacks have in

common?