15
INFORMATION ASSURANCE AND SECURITY

Information Assurance and Security

Embed Size (px)

Citation preview

Page 1: Information Assurance and Security

INFORMATION ASSURANCE AND SECURITY

Page 2: Information Assurance and Security

IntroductionThe field of Information Security is the study of countermeasures to the threat of information infrastructure failure to ensure the security of electronic information

It embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed.

Page 3: Information Assurance and Security

This programmed introduces the technical, legal and commercial aspects of Information Security.

Students come from a variety of backgrounds, ranging from new graduates through to senior security managers in blue chip enterprises seeking a formal qualification in Information Security.

Intro Cont…

Page 4: Information Assurance and Security

Guideline Principle The modules represent a consensus from

the information system security community

The modules represents core content that is common to all information system programs internationally

The modules is career target that require both core and elective contents

Page 5: Information Assurance and Security

Proposed Qualifications National Diploma in Information Security

National Diploma in Information Systems

MSc Information Security

Page 6: Information Assurance and Security

Objective To provide a benchmark professional

qualification for security manager in both private and public sectors

To learn the knowledge and skill required for the security industry, particularly to interpretation law application, risk assessment, development of operational plans and policy, practice and procedure.

Page 7: Information Assurance and Security

StructureNational Diploma in Information Security Interpret and apply security related Law Conduct security investigations Develop security policy and procedure Manage the application of security

principles, practices and procedure Risk management and assessment

Page 8: Information Assurance and Security

National Diploma in Information Systems:

Core courses include the following:•Foundations of Information Systems•Data and Information Management•Enterprise Architecture•IT Infrastructure•IS Project Management•Systems Analysis and Design•IS Strategy, Management, and Acquisition

Structure Cont…

Page 9: Information Assurance and Security

Compulsory Modules Operational Security Plans Security Law/Cyber Law Security Risk Assessments Security Surveys Security Policy, Practice and Procedure

Page 10: Information Assurance and Security

Elective Modules Managing Security Security Investigations Manage Critical Incidents Digital Forensic Database Security Advanced Cryptography Standards and Evaluation Criteria

Page 11: Information Assurance and Security

MSc Information SecurityThe MSc information Security consists of six modules and projects

Core Modules Security ManagementAims

The modules emphasise on the need for good security management. Aims are to identify the problems associated with security management and to show how various (major) organisations solve those problems

ObjectivesOn completion of the module, the student will appreciate the complexities of security management, and have seen how some companies attempt to solve these problems

Page 12: Information Assurance and Security

An introduction to cryptography and security mechanisms

AimsThe module is non-technical and the main objective is to introduce the students to the main types of cryptographic mechanism, to the security services which they can provide, and to their management, including key management. The mathematical content of this module is minimal. Support materials for the elementary mathematics needed for this module will be provided.ObjectivesOn completion of this module students will have gained an understanding of the use of, and services provided by, the main types of cryptographic scheme. They should also have gained an appreciation of the need for good key management. This will include an appreciation of the general nature of: encryption techniques for providing confidentiality services (including stream ciphers, block ciphers and public key techniques), mechanisms for providing data integrity and origin authentication, including MACs and digital signatures, message exchanges to provide entity authentication and/or key establishment, and the use of Trusted Third Parties, such as Certification Authorities (CAs), to provide and support Public Key Infrastructures. Students completing this module should not expect to be able to design algorithms.

Page 13: Information Assurance and Security

•Network SecurityAimsThe module is concerned with the protection of data transferred over commercial information networks, including computer and telecommunications networks. After an initial brief study of current networking concepts, a variety of generic security technologies relevant to networks are studied, including user identification techniques, authentication protocols and key distribution mechanisms. This leads naturally to consideration of security solutions for a variety of types of practical networks, including LANs, WANs, proprietary computer networks, mobile networks and electronic mail.

ObjectivesAt the end of the module students should have gained an understanding of the fundamentals of the provision of security in information networks, as well as an appreciation of some of the problems that arise in devising practical solutions to network security requirements.

Page 14: Information Assurance and Security

•Computer SecurityAimsThis course deals with the more technical means of making a computing system secure. This process starts with defining the proper security requirements, which are usually stated as a security policy. Security models formalise those policies and may serve as a reference to check the correctness of an implementation. The main security features and mechanisms in operating systems will be examined as well as security related issues of computer architecture. Specific well-known operating systems are then studied as case studies. Other areas investigated include the security of middleware, software protection and web security.ObjectivesOn completion of this course students should be able to:•Demonstrate an understanding of the importance of security models with reference to the security of computer systems.•Describe the features and security mechanisms which are generally used to implement security policies.•Provide examples of the implementation of such features and mechanisms within particular operating systems.•Display a breadth of knowledge of the security vulnerabilities affecting computer systems.•Demonstrate an understanding of the main issues relating to Web security in the context of computer systems.

Page 15: Information Assurance and Security

Question

?

Thanks