Computer Security Week1
Computer Security Week1
Information Assurance
Course Description
Levels of Planning
Planning misalignment
The System Security Plan
Policy Development and Implementation
Week 5-6 Risk Management
Principles of risk
Type of risk
Risk strategies
The Risk Management Framework (RMF)
Week 7 - Security Metrics and Key
Performance Indicators (KIPS)
Confidentiality
Protecting Example:
information Criminal steals
from customers’ usernames,
passwords, or credit card
unauthorized
information
access and
disclosure
CIA Triad
Integrity
Protecting
information
from
unauthorized
modification
Example:
Someone alters payroll
information or a proposed
product design.
CIA Triad
Availability
Example:
Your customers are
unable to access your
online services.
Preventing
disruption in
how
information
is accessed
Cybersecurity Motivation
David Ulevitch, Founder OpenDNS Katie Moussouris, Microsoft Bug Bounty creator
People
Training, education, awareness, repetition
Process
Governance, oversight, policy, reporting
Technology
Firewalls, IDS/ISP, SIEM, anti-malware
Strong passwords, Logging/monitoring
Social Engineering Best Practices
USE YOUR SECURITY SPIDER SENSE!
ALWAYS validate requests for
information if you’re not 100000%
sure
Calla number YOU know
Google it…
ALWAYS ASK QUESTIONS!
Is this who I think it is FOR SURE?
Did someone mention this to me
personally, or was it discussed at a staff
meeting?
Is this the FIRST I’m hearing about this?
Cyber Security and Privacy Starts and
Ends with Us!
Security Tips
Commit to a disciplined practice of information
security and continue to refresh yourself so you
don’t become a point of vulnerability in our
security defenses.
Ethical Hacking
ou !
k y
h a n
T