01 Introduction To Information Security
01 Introduction To Information Security
JOE MARTIN J
0017134001
3
Scenario
An employee working for an organization,
downloads a software from a website. After
installing the software, however, his/her
machine reboots and starts to malfunction.
http://msutoday.msu.edu/
Years
http://datalossdb.org/
COPYRIGHT © WHITE HAT GLOBAL ACADEMY
ALL RIGHTS RESERVED. REPRODUCTION IS STRICTLY PROHIBITED.
7
Security Incidents by Breach Type - 2015
http://datalossdb.org/
COPYRIGHT © WHITE HAT GLOBAL ACADEMY
ALL RIGHTS RESERVED. REPRODUCTION IS STRICTLY PROHIBITED.
8
Security Breaches – World wide
http://datalossdb.org/
COPYRIGHT © WHITE HAT GLOBAL ACADEMY
ALL RIGHTS RESERVED. REPRODUCTION IS STRICTLY PROHIBITED.
9
Essential Terminologies
Threat Exploit Vulnerability
Loss of Financial
trust loss
Misuse of
Data
computer
loss/theft
resources
“Ensuring that information is accessible only to those who have authorized to access”
Authenticity
Integrity
“Ensuring that the information is complete, accurate, reliable, and is in its original form”
Availability
“Ensuring that the information is accessible to authorized persons when required without any delay”
Non - Repudiation
“Ensuring that a party to a contract or a communication cannot deny the authenticity of their signature on a document”
Functionality
Easy of use
Information Communication
Software
Hardware