Information Security Chapter 1
Information Security Chapter 1
UNIVERSITY
Information Security
-4
Information Security
Overview
A successful organization should have the
following multiple layers of security in
place for the protection of its operations
such as:
Physical security
Personal security
Operations security
Communications security
Network security
Information security
-5
Information Security Overview
-6
Information Security
Overview
Information security, therefore, is the
protection of information and its
critical elements, including the
systems and hardware that use,
store, and transmit that information.
-7
Information Security Overview
-8
What is Information Security
9
Confidentiality – restrict
access to authorized
a
lity nti
I nt
individuals
de
eg
Integrity – data has not
nfi
ri
been altered in an
ty
Co
unauthorized manner
Availability – information
Availabilit can be accessed and
y modified by authorized
individuals in an
appropriate timeframe
Confidentiality, Integrity, and Availability
(CIA)
12
Authorization
After declaring identity at the identification
stage and proving it at the authentication
stage, users are assigned a set of
authorizations (also referred to as rights,
privileges, or permissions) that define what
they can do on the system.
These authorizations are most commonly
. Accountability:
Accountability is another important
principle of information security that
refers to the possibility of tracing
actions and events back in time to
the users, systems, or processes that
performed them, to establish
responsibility for actions or
omissions.
Lecturer: Ahmed Hussein Ali 10/31/2024
18
Any Question
END..