0% found this document useful (0 votes)
136 views

Chapter 1 - Introduction To Information Security

Here are the answers to the tutorial questions: 1. The 5 components of an information system are: a) Hardware b) Software c) Network d) Data e) People 2. Information Security is designed to protect the confidentiality, integrity and availability (CIA) of computer system data from those with malicious intentions. 3. The two categories of software are: a) System software b) Application software 4. Top-down approach starts from senior management and moves down the organization. It focuses on policy and standards. Bottom-up starts from users and technical experts and moves up. It focuses on technical controls and specific security solutions.

Uploaded by

Nur Fazirah
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
136 views

Chapter 1 - Introduction To Information Security

Here are the answers to the tutorial questions: 1. The 5 components of an information system are: a) Hardware b) Software c) Network d) Data e) People 2. Information Security is designed to protect the confidentiality, integrity and availability (CIA) of computer system data from those with malicious intentions. 3. The two categories of software are: a) System software b) Application software 4. Top-down approach starts from senior management and moves down the organization. It focuses on policy and standards. Bottom-up starts from users and technical experts and moves up. It focuses on technical controls and specific security solutions.

Uploaded by

Nur Fazirah
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

CHAPTER 1:

INTRODUCTION TO
INFORMATION SECURITY

KRISTIE CLEOPHAS GOROTUD


Jan 2021
CONTENT

 DEFINITION OF INFORMATION SYSTEMS


 COMPONENTS OF INFORMATION SYSTEMS
 WHAT IS INFORMATION SECURITY
 APPROACHES TO INFORMATION SECURITY
 IMPLEMENTATION
DEFINITION OF INFORMATION SYSTEM

an integrated set of components for collecting,


storing, and processing data and for
providing information, knowledge, and digital
product.
COMPONENTS OF INFORMATION
SYSTEMS
1) Hardware- a computer and its peripheral equipment: input, output, and storage
devices
 Computer
 Smartphone
 Tablets

2) Software- sets of instruction that tell the computer how to take data in, how to
process it, how to display information, and how to store data and information
 Two categories
a) system software –manage computer, data, program files
b) application software- handle specific tasks for user
3) Network- hardware and software that facilitate fast transmission and reception
of text, pictures, sound and animation in the form of electronic data
 E.g Local area network (LAN)

4) Data- input that the system takes to produce information


 E.g employee record
 Data stored in database

5) People- information system professionals and users who analyze organizational


information needs, design and construct information systems, write computer
programs, operate the hardware, and maintain software
 E.g database administrator, manager
WHAT IS INFORMATION SECURITY

Designed to protect the confidentiality,


integrity and availability (CIA) of
computer system data from those with
malicious intentions.
Confidentiality

 Information which is sensitive or confidential must remain so and be shared


only with appropriate users.
 For example, our confidential medical records should be released only to
those people or organizations authorized to see it.
 i.e. doctor, hospital, insurance, government agency, you.
Integrity

 Information must retain its integrity and not be altered from its original state.
 The records should be well protected so that no one can change the
information without authorization.
Availability

 Information and systems must be available to those who need it.


 The records should be available and accessible to authorized users
APPROACHES TO INFORMATION
SECURITY IMPLEMENTATION
Birokrasi

 Definisi :
 1 sistem pemerintahan yg
dijalankan oleh pegawai-
pegawai yg tidak dipilih oleh
rakyat.
 2 cara pemerintahan yg sangat-
sangat dikuasai oleh pegawai
kerajaan.
 3 cara pentadbiran yg banyak
melibatkan peringkat dan
peraturan.
Thank you
Tutorial

1. State 5 components of information system (5 marks)


2. What is the definition of Information Security? (3 marks)
3. Give two categories of software (2 marks)
4. Distinguish Top-down and Bottom-up approaches to Information Security
Implementation (10 marks)

You might also like