0% found this document useful (0 votes)
9 views

Module-1 IAS2

Uploaded by

lacaygelo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Module-1 IAS2

Uploaded by

lacaygelo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

The Security Landscape

AIS 2_Module 1
Learning Objectives:
• At the end of this topic, the students will be able
to:
 Define basic terms associated in information
Security.
 Explain the never ending arms race in the cyber
world
 Identify basic approaches to security
The security landscape
The real scenario:
- System vulnerabilities
- Influx of cybercriminals
- Sophisticated weapons
- Trained actors
- Various types of attacks
TASKS:
• Defend
• Use techniques
• Proactive
• Understand security breach
• Prevent or mitigate as soon as possible
PROACTIVE:
• Stay informed
• Read the landscape
• Know your systems and network
• Understand that you can only protect a network
to a point.
• Know what an attack looks like
• Stop it before any substantial damage can occur.
Security Concepts
Asset - something that has value
to an individual or an
organization.
- Physical
- Digital
Security Concepts
Threats- represent anything that
has the potential to cause the loss
of an asset.
- Malwares
- Virus
- Hackers and etc.
Security Concepts
Threat agents - is the actual
person or entity that carries out a
threat.
- Internal/ external
- Resources/ funding
- Motives
Security Concepts
Type of Actors
- Syndicate (Individual/ Group)
- Nation
- Business competitors
Security Concepts
Vulnerability - the weakness in
the system

- People/Employee
- Hardware
- Codes/ Programs
Security Concepts
Exploit - procedure, a piece of
software, or a sequence of
commands that takes advantage
of a vulnerability to actually carry
out an attack.
What is Security?
• the degree of protection against
danger, damage, loss, and criminal
activity.
Security Challenges
Non Repudiation
Security Components
What is Risk Management?
• Risk management is the process of
identifying security issues and
deciding which countermeasures to
take in reducing risk to an acceptable
level.
• main objective is to reduce the
risk for an organization
Threat Agents
Thank you for Listening!

You might also like