Lecture 1 Introduction To The Management of Information Security
Lecture 1 Introduction To The Management of Information Security
• Physical security
• Operations security
• Communications security
• Cyber (or computer) security
• Network security
Therefore I say: One who knows the enemy and knows himself will not be in
danger in a hundred battles [2]
One who does not know the enemy but knows himself will sometimes win,
sometimes lose[2]
One who does not know the enemy and does not know himself will be in
danger in every battle [2]
• To protect your organization’s information, you must:
– know yourself; that is, be familiar with the information
assets to be protected and the systems, mechanisms, and
methods used to store, transport, process, and protect
them; and
– know the threats you face
Compiled by: Dr Ammar Alazab
March 2023 Updated by Anuj Nepal 17
Key Concepts of Information
Security: Threats and attacks
• In the real world, a hacker frequently spends long hours examining the
types and structures of targeted systems and uses skill, guile, and/or
fraud to attempt to bypass controls placed on information owned by
someone else
• Hackers possess a wide range of skill levels, as with most technology
users
– However, most hackers are grouped into two general categories—the
expert hacker and the novice hacker
• Once an attacker gains access to a system, the next step is to increase
privileges (privilege escalation)
– Most accounts associated with a system have only rudimentary “use”
permissions, the attacker needs administrative or “root” privileges
2018 47