0% found this document useful (0 votes)
12 views

Introduction To InfoSecurity Policy Lecture1

This document provides an introduction to information security policies and defines key security concepts. It discusses the importance of having multiple layers of security, including physical, personnel, operational, communication, and network security. Information security aims to protect the confidentiality, integrity and availability of information assets. Computer security controls are put in place to safeguard data, software, hardware and firmware. Information security involves protecting information and critical elements through policies, awareness, training, education and technology. No single measure can ensure complete security.

Uploaded by

Zainab Augie
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Introduction To InfoSecurity Policy Lecture1

This document provides an introduction to information security policies and defines key security concepts. It discusses the importance of having multiple layers of security, including physical, personnel, operational, communication, and network security. Information security aims to protect the confidentiality, integrity and availability of information assets. Computer security controls are put in place to safeguard data, software, hardware and firmware. Information security involves protecting information and critical elements through policies, awareness, training, education and technology. No single measure can ensure complete security.

Uploaded by

Zainab Augie
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Khadi

jaAmi
nuUmar
.

I
ntr
oduct
iont
oInf
ormat
ionSecur
it
yPol
icy

CBS1203
Whati
sSecur
it
y?

Securi
tycanbedefi
nedast
hequal
i
tyorstateofbei
ngsecur
ed-
-t
o
befreefr
om danger
”Tobeprot
ect
edfrom adver
sari
es.

Asuccessf
ulor
gani
zat
ionshoul
dhav
emul
ti
plel
ayer
sofsecur
it
y
i
nplace:

1.
Physical
securit
y:Toprotectphysical
items,
obj
ect
s,orar
eas
fr
om unauthor
izedaccessandmi suse

2.
Personnel
secur
it
y:Toprotectt
heindi
vi
dualorgroupof
i
ndiv
idual
swhoareauthor
izedtoaccesstheorgani
zati
onandi
ts
oper
ati
ons

3.
Operat
ionssecur
it
y:Topr ot
ectt
hedet
ail
sofapar
ti
cul
ar
oper
ati
onorseriesofact
ivi
ti
es

4.Communicat
ionSecur
it
y:Topr
otectcommuni
cat
ionsmedi
a,
t
echnology
,andcont
ents

5.
Networksecur
it
y:Topr
otectnet
wor
kingcomponent
s,connect
ions,
andcontent
s

Informati
onsecur i
ty:
Topr ot
ecttheconf i
denti
ali
ty,
integri
tyand
av ail
abi
l
ityofinf
ormationassets,whetherinst
orage, pr
ocessing,or
transmission.
Iti
sachievedviatheapplicat
ionofpolicy,educat
ion,
traini
ngandawar eness,andtechnology.
Comput
erSecur
it
y

Whati
scomput
ersecur
it
y?

Comput ersecurit
ycanbedef inedascontr
olsthatareputinpl
ace
toprovdeConf
i identi
ali
ty,Integri
ty,Av
ail
abil
it
yf orall
component sofcomput ersy stems.Thesecomponent sincl
ude
Data,Soft
war e,
Har dware,andf ir
mware.

Har
dware:I
sthephysical
par
toft
hecomput
er,
li
ket
hesy
stem
memoryanddiskdr
ive.

Fir
mwar e:
Ist hepermanentsoftwarethatrunsthepr
ocessesof
thecomput erandismostlyi
nvisiblet
otheuser,li
ket
hestart
-up
funct
ionsthatmakeelement soft hehardwareworkt
ogether
.

Sof
tware:I
sthepr ogrammi ngthatoffer
sser
vicestotheuserand
admini
str
ator.Theoper at
ingsystem,wordprocessor,
computer
games,andInternetbrowserareallexampl
esofsof t
ware
commonlyfoundonacomput er.

Whati
sInf
ormat
ionSecur
it
y?

I
tist
heprot
ect
ionofi
nfor
mat i
onanditscri
ti
cal
element
s,i
ncl
udi
ng
t
hesyst
emsandhardwarethatuse,
store,
andtr
ansmitt
hat
i
nfor
mati
on.

Tool
s,suchaspol
i
cy,
awar
eness,
trai
ning,
educat
ion,
andt
echnol
ogy
ar
enecessary
.

Itcanal
sobedef i
nedasallmeasurest
akentopr ev
entunauthori
zed
useofel
ectroni
cdatasuchasdiscl
osur
e,al
terat
ion,subst
it
uti
on,or
destr
uct
ionofthedataconcer
ned.AndtheProvi
sionofthefoll
owing
thr
eeservi
ces:

 Confi
dent
ial
i
ty:
Conceal
mentofdat
afr
om unaut
hor
ized
par
ti
es
I
ntegr
it
y:Assur
ancet
hatdat
aisgenui
ne

 Avai
l
abili
ty:
System st
il
lfunct
ionsef
fi
cient
lyaf
tersecur
it
y
pr
ovisi
onsareinplace

Nosi
ngl
emeasur
ecanensur
ecompl
etesecur
it
y.

Whyi
sInf
ormat
ionsecur
it
yimpor
tant
?

Governments,
commerci
albusi
nesses,
andi
ndi
vi
dual
sar
eal
l
st
oringinf
ormati
onel
ect
roni
cal
ly

 Compact
,Inst
ant
aneoust
ransf
er,
easyaccess

Abi
l
ityt
ouseinf
ormati
onmoreeff
ici
ent
lyhasr
esul
tedi
nar
api
d
i
ncr
easeint
hevalueofi
nfor
mati
on

I
nfor
mati
onstor
edelectr
oni
cal
lyfacesnewandpot
ent
ial
l
ymor
e
damagi
ngsecur
it
ythreat
s:t
hatis

 Canpot
ent
ial
l
ybest
olenf
rom ar
emot
elocat
ion

 Mucheasi
ert
ointer
ceptandal t
erel
ect
roni
ccommuni
cat
ion
t
hanit
spaper
-basedpredecessors.

You might also like