Lesson 1 Information Security
Lesson 1 Information Security
March 2025
Introduction To Information Security
Information Security
Information Security
March 2025
9:34:25 AM
2
Course Contents March 2025
Introduction To Information Security
◼ Cryptographic Tools
◼ Encryption Algorithms
◼ Secure Hash Function
◼ Public Key Encryption
◼ Public Key Infrastructure
◼ Digital Signature
◼ User Authentication
3
Course Contents March 2025
Introduction To Information Security
◼ Cyber Attacks
◼ Intrusion Detection
Information Security
◼ Software Security
4
Course Information March 2025
Introduction To Information Security
❑ Mid-term Exam 20 %
❑ Attendance & Class Activities 20 %
❑ Final Exam 60 %
◼ Mid-term exam has second chance exam & the second
chance has 70 % of the total marks.
7
p March 2025
Introduction To Information Security
◼ Cheating and Plagiarism
◼ Based on the rule and regulation of the Ministry of Higher
Education, any kind of cheating and plagiarism is
Information Security
knowledge.
Information Security
tolerated.
❑ Cheating, plagiarism or any kind of disruptive behavior are
❑ Unauthorized Access,
❑ Misuse,
❑ Destruction, or
❑ Disruption.
9:34:26 AM
11
March 2025
Introduction To Information Security
◼ Preserve the:
◼ Confidentiality,
Information Security
◼ Integrity, &
◼ Integrity
◼ Availability
12
March 2025
Introduction To Information Security
◼ Confidentiality: This term covers two
related concepts:
Information Security
◼ Data confidentiality
◼ Privacy
◼ Cryptography
13
March 2025
Introduction To Information Security
◼ Integrity
◼ Data integrity
Information Security
◼ System integrity
◼ Accountability
14
The Challenges of Computer Security March 2025
Introduction To Information Security
◼ Access
◼ Use
◼ Recording
◼ Disruption / Interference
◼ Modification
◼ Destruction / Damage
16
March 2025
Introduction To Information Security
◼ Security Attributes or Security Goals:
❑ Confidentiality
Information Security
❑ Integrity
❑ Availability
❑ Accountability
❑ Attackers
❑ Deception / Fraud
❑ Disruption
❑ Repudiation
18 Requirements of Security Attributes
March 2025
Introduction To Information Security
Information Security
19
p Security & Dependability Attributes March 2025
Introduction To Information Security
Information Security
p
20 Security & Dependability Tree
March 2025
Introduction To Information Security
Information Security
21 To Achieve Dependability and Security
p March 2025
Introduction To Information Security
◼ To attain or achieve the various attributes of
dependability and security, there are four
major categories of means:
Information Security
❑ Fault Prevention
❑ Fault Tolerance
❑ Fault Removal
❑ Fault Forecasting
22
p March 2025
Introduction To Information Security
cybercriminals.
◼ To protect business assets, companies must
routinely review, update and improve security
to stay ahead of cyberthreats and increasingly
sophisticated cybercriminals.
9:34:26 AM
23
p March 2025
Introduction To Information Security
◼ Physical security
◼ Physical security is the protection of:
❑ Hardware
❑ Software
❑ Data
9:34:26 AM
24
p March 2025
Introduction To Information Security
its assets.
◼ Safeguarding the physical security of a
business means protecting it from:
❑ Threat actors
9:34:26 AM
25
p March 2025
Introduction To Information Security
❑ Surveillance
❑ Testing
9:34:26 AM
26
p March 2025
Introduction To Information Security
◼ Access control
❑ Controlling access to:
Information Security
◼ Buildings
◼ Research centers
◼ Laboratories
◼ Data centers
◼ Other locations
❑ The goal of access control is to record,
monitor and limit the number of
unauthorized users. 9:34:26 AM
27
p March 2025
Introduction To Information Security
◼ Surveillance
❑ Used to monitor digital & physical actions &
Information Security
9:34:26 AM
29
p March 2025
Introduction To Information Security
◼ Types of Surveillance:
❑ Physical Surveillance (CCTV)
Information Security
❑ Electronic Surveillance
❑ Cybersecurity Surveillance
❑ Biometric Surveillance
◼ Testing
❑ Testing is a reliable way to increase physical
Information Security
security.
❑ Companies that have strong security
protocols test their policies to see if they need
to be updated or changed.
❑ Such tests can be performed by ethical
hackers.
9:34:26 AM
31
p March 2025
Introduction To Information Security
❑ Intrusion detection
❑ Intrusion prevention
9:34:26 AM
End of Lesson 1
Question / Discussion?