Module-1 IAS2
Module-1 IAS2
AIS 2_Module 1
Learning Objectives:
• At the end of this topic, the students will be able
to:
Define basic terms associated in information
Security.
Explain the never ending arms race in the cyber
world
Identify basic approaches to security
The security landscape
The real scenario:
- System vulnerabilities
- Influx of cybercriminals
- Sophisticated weapons
- Trained actors
- Various types of attacks
TASKS:
• Defend
• Use techniques
• Proactive
• Understand security breach
• Prevent or mitigate as soon as possible
PROACTIVE:
• Stay informed
• Read the landscape
• Know your systems and network
• Understand that you can only protect a network
to a point.
• Know what an attack looks like
• Stop it before any substantial damage can occur.
Security Concepts
Asset - something that has value
to an individual or an
organization.
- Physical
- Digital
Security Concepts
Threats- represent anything that
has the potential to cause the loss
of an asset.
- Malwares
- Virus
- Hackers and etc.
Security Concepts
Threat agents - is the actual
person or entity that carries out a
threat.
- Internal/ external
- Resources/ funding
- Motives
Security Concepts
Type of Actors
- Syndicate (Individual/ Group)
- Nation
- Business competitors
Security Concepts
Vulnerability - the weakness in
the system
- People/Employee
- Hardware
- Codes/ Programs
Security Concepts
Exploit - procedure, a piece of
software, or a sequence of
commands that takes advantage
of a vulnerability to actually carry
out an attack.
What is Security?
• the degree of protection against
danger, damage, loss, and criminal
activity.
Security Challenges
Non Repudiation
Security Components
What is Risk Management?
• Risk management is the process of
identifying security issues and
deciding which countermeasures to
take in reducing risk to an acceptable
level.
• main objective is to reduce the
risk for an organization
Threat Agents
Thank you for Listening!