Lecture 01 - Information Security-201.
Lecture 01 - Information Security-201.
Aleatha Shanley
(Unit Coordinator & Lecturer)
Email: [email protected]
Phone : +61 8 6304 2849
Office: ECU JO Campus 18.418A
What to expect in this unit
Assignments
What is information?
What is Information Security?
Why does it matter?
Recommended Viewing:
Panopticon by Peter Vlemmix
https://www.youtube.com/watch?v=FUyB0Tsj6jE
History of Information Security
The History of Information Security
Confidentiality
The quality or state of preventing disclosure or exposure to unauthorized individuals or
systems
Integrity
The quality or state of being whole, complete, and uncorrupted
Utility
The quality or state of having value for some purpose or end. Information has value
when it serves a particular purpose
Possession
The quality or state of having ownership or control of some object or item. Information is
said to be in possession if one obtains it, independent of format or other characteristic.
The CIA Triangle and the CNSS Model
• Data owner: responsible for the security and use of a particular set of
information
• Data users: end users who work with information to perform their
daily jobs supporting the mission of the organisation
Information Security: Art or Science?
Security as an Art
No hard and fast rules nor many universally accepted complete solutions
No manual for implementing security through entire system
Security as science
Dealing with technology designed to operate at high levels of performance
Specific conditions cause virtually all actions that occur in computer systems
Nearly every fault, security hole, and systems malfunction are a result of
interaction of specific hardware and software
Summary
Information security is a “well-informed sense of assurance that the information risks and
controls are in balance” It aims to achieve CIA of information whether in storage, transmission
or processing
Information security is the protection of information assets that use, store, or transmit
information through the application of policy, education, and technology
Computer security began immediately after first mainframes were developed and is now
considered a subset of Information Security
There are many types of security: physical, personal, operations, communications, network and
national security – to name a few
Critical characteristics of information security include confidentiality, integrity, availability (CIA
triad) that must be protected at all times.
Summary
Tutorial
Activity 1: Footprinting and Web Reconnaissance
Activity 2: CNSS Security Model (CIA)
Required reading
Next Week
The Need for Security and Threats to Information Security