100% found this document useful (1 vote)
162 views13 pages

Importance of Information Security

1) Information security became increasingly important from the 1960s onward as organizations and governments worked to protect against evolving hacker threats and cybercrimes. 2) Key developments included the first hacker attacks in the 1970s, governments becoming proactive against cybercrime in the 1980s, and organized crime getting involved in the 1990s. 3) By the 2010s, information security was serious with data encryption and security policies widespread to prevent data theft and identity theft while maintaining productivity and complying with privacy laws.

Uploaded by

Nikki Jean Hona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
162 views13 pages

Importance of Information Security

1) Information security became increasingly important from the 1960s onward as organizations and governments worked to protect against evolving hacker threats and cybercrimes. 2) Key developments included the first hacker attacks in the 1970s, governments becoming proactive against cybercrime in the 1980s, and organized crime getting involved in the 1990s. 3) By the 2010s, information security was serious with data encryption and security policies widespread to prevent data theft and identity theft while maintaining productivity and complying with privacy laws.

Uploaded by

Nikki Jean Hona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Information Security

and
Management
Importance of Information Security
History of Information Security
History of Information Security

1960s: Organizations start to protect their computers


The largest security concerns at this interval were at the points of
access.

1970s: The first hacker attacks begin


People started to seek ways to infiltrate phone lines connected to
computers, so that they could steal data. These people became the first
groups of hackers.
History of Information Security

1980s: Governments become proactive in the fight


against cybercrime
• Limited information security systems could not keep up with the
constant barrage of clever approaches hackers used to break into
computer systems.
• It became extremely prominent when a small group of teenagers
from Milwaukee, known as "the 414s," broke into over 60 military
and corporate computer systems and stole over $70 million from
U.S. banks.
• The sentences were exceedingly light, ranging from stern
warnings to probation.
History of Information Security

1990s: Organized crime gets involved in hacking


• Worldwide web was made available in 1989
• Hackers started to steal data from people and governments via the web.
2000s: Cybercrime becomes treated like a crime
• Hackers were jailed for years as punishment for cybercriminal activity.
• By 2010, high-profile hackers were getting decades in prison for
cybercrimes.
2010s: Information security becomes serious
• Data encryption, which scrambles data to render it unreadable to
unauthorized users, became more widespread.
• Organizations also implement comprehensive information security
policies that prevent their employees from making any mistakes that
make data accessible to intruders.
What is Security?

• Security is about
– Honest user
– Dishonest Attacker
– How the Attacker
• Disrupts honest user’s use of the system (Integrity, Availability)

Network Attacker – Intercepts and


controls network communication

Web Attacker – Sets up malicious


site visited by victim; no control of
network

OS Attacker – Controls malicious


files and applications
What is Security?

SYSTEM

Network Attacker – Intercepts and


controls network communication

Web Attacker – Sets up malicious site


visited by victim; no control of network

OS Attacker – Controls malicious files


and applications

Confidentiality: Attacker does not learn Player 456’s secrets


Integrity: Attacker does not undetectably corrupt system’s function for Player 456
Availability: Attacker does not keep system from being useful to Player 456
Information Security Terminology
(continued)
Information Security Terminology
(continued)
Importance of Information Security

• Preventing data theft


– Security is often associated with theft prevention
– The theft of data is one of the largest causes of financial loss
due to an attack
– Individuals are often victims of data thievery
• Thwarting identity theft
– Identity theft involves using someone’s personal information
to establish bank or credit card accounts
• Cards are then left unpaid, leaving the victim with the debts and
ruining their credit rating
Importance of Information Security

• Avoiding legal consequences


– A number of federal and state laws have been enacted to
protect the privacy of electronic data
• The Health Insurance Portability and Accountability Act of 1996
(HIPAA)
• The Sarbanes-Oxley Act of 2002 (Sarbox)
• The Gramm-Leach-Bliley Act (GLBA)
• USA Patriot Act (2001)
• The California Database Security Breach Act (2003)
• Children’s Online Privacy Protection Act of 1998 (COPPA)
Importance of Information Security

• Maintaining Productivity
– Cleaning up after an attack diverts resources such as time
and money away from normal activities

Cost of attacks
Importance of Information Security

• Foiling cyberterrorism
– Cyberterrorism
• Attacks by terrorist groups using computer technology and the
Internet
– Utility telecommunications, and financial services companies
are considered prime target of cyberterrorists

You might also like