Lecture 1
Lecture 1
(COMP1843)
Introduction to the Course
and to Infosec
Dr Irfan Chishti
Module Team
⚫ Email: [email protected]
⚫ Coursework - 100%
⚫ Case Study based on all learning outcomes
⚫ 3000 words
⚫ Due by 07/04/2022
Coursework - Important
Start your coursework early as
statistics shows, the students who
have started their coursework early
they are highly likely to score high
grades than the students who have
started at a later stage
Recommended Reading
⚫ Information Security Principles and Practices –
Merkow.M and Breithaupt,J. Pearson Education.
⚫ Management of Information Security –
Whitman,M.E and Herbert, J.M. Cengage
Learning.
⚫ Whitman,M.E and Herbert, J.M. 2012. Principles of
Information security.4th Edition. Cengage Learning.
http://almuhammadi.com/sultan/sec_books/Whitma
n.pdf
Today’s Lecture - Outline
⚫ Information Security (InfoSec) Overview
➢ History, Definitions, Components, Challenges, &
characteristics
⚫ CIA Triad & the McCumbers Cube
⚫ Information Assets & Other Key Terms
Definitions
⚫ To be protected from adversaries and
from those who would do harm,
intentionally or otherwise.
⚫A well-informed sense of assurance that
the information risks and controls are in
balance (J. Anderson, 2002)
Definitions (Cont’d)
Protection of information and its critical
elements including systems that use,
store, and transmit that information (CNSS).
⚫ InfoSec risk and controls cover a broad
range of issues:
○ From
protection of data to protection of
human resources
Components of InfoSec
Information Assets
Key information assets include
⚫ Software,
⚫ Hardware,
⚫ Data,
⚫ People,
⚫ Procedures,
⚫ Networks
Assets - Subject/Object - Attack
Subject: attackers use computers actively
to launch attacks against targets
Object computers are under attack!
Other Key Terms
⚫ Access: Ability to use/manipulate/modify/
affect another subject or object
⚫ Attack: An (un)intentional act to damage or
compromise information & systems
⚫ Risk: Likelihood of an unwanted occurrence
Security and
Control
• Risk management
• Disaster Recovery
• Security awareness program
35
⚫ Non-Technical Professionals
Articulates & communicates
organisational policies & allocates
resources to the relevant groups.
Stakeholders’ Common Goals
The three communities of interest are also
responsible for the following:
⚫ Evaluating the risk controls