L4-U05-Lecture 01 Introduction
L4-U05-Lecture 01 Introduction
UNIT 05 – SECURITY
Introduction to Security
Phil Smith
LEARNING OUTCOMES
• 2 summative assignments
• Each has a formative assignment with feedback.
STRUCTURE
• Lectures.
• Books (in lab).
• Books in LRC.
• Internet, you have internet access.
• Periodicals etc.
WHAT THIS UNIT IS ABOUT
• The aim of this unit is to provide you with knowledge of security, associated
risks and how security breaches impact on business continuity.
• You will –
• examine security measures involving
• access authorisation,
• regulation of use,
• implementing contingency plans
• devising security policies and procedures.
HOW
• All of which are crucial for gaining employment and developing academic
competence.
QUESTIONS ?
• Any questions?
START
• Risks:
1. unauthorised use of a system;
2. unauthorised removal or copying of data or code from a system;
3. damage to or destruction of physical system assets and environment;
4. damage to or destruction of data or code inside or outside the system;
5. naturally occurring risks.
ORGANISATIONAL SECURITY
• Organisational security:
• business continuance;
• backup/restoration of data;
• audits;
• testing procedures e.g.
• data,
• network,
• systems,
• operational impact of security breaches,
• WANs,
• intranets,
• wireless access systems.
UNDERSTAND RISKS TO IT
SECURITY Task
What types of risk to an organisation’s IT security exist in relation to unauthorised access of organisational data and equipment in
different environments.
Also find examples and situations where unauthorised system access can occur.
Consider -
• 15 Minutes
• I will then ask each of you for what you think is the most important risk with your reasoning?
UNDERSTAND RISKS TO IT
SECURITY Task
Consider -
1. Large organisations;
2. MWS;
• 15 Minutes
• I will then ask each of you for one threat and its impact.
UNDERSTAND RISKS TO IT
SECURITY Task
Research what ways can IT be used to detect unauthorised access – benefits and
drawbacks?
• 15 Minutes
• Malware
• Intruders
• Insiders
• Criminal organisations
• Terrorists
• Information warfare
TRENDS
Difficult to quantify
Direct loss – fraud
Loss of proprietary information
Loss of business through outage
Damage to reputation
Repair costs
REASONS FOR ATTACK