Information Security Chapter 1
Information Security Chapter 1
Information Security
Introductions to Information Security
Outlines
1. Grading System
2. Text Book
3. Course Outlines
Grading System
Components of
information security:
Primary goals of Information Security
Availability
Primary goals of Information Security
networks hardware
Components of
an Information
System
procedures data
people
Components of an Information System
Terms:
Logical design:
Is the blueprint for the desired solution. In this stage, analysts generate
estimates of costs and benefits to allow for a general comparison of
available options. At the end of this phase, another feasibility analysis is
performed.
Phases of SDLC
Physical Design: specific technologies are selected - a make-or-buy decision.
prepared, and the sponsors are then presented with the system for a performance
Maintenance and Change: The maintenance and change phase is the longest and
most expensive of the process. the system is tested for compliance, and the
• The CISO may also be referred to as the manager for IT security, the
security administrator, or by a similar title.
Senior Management
Information Security Project Team
• End users: Those whom the new system will most directly affect.
Data Responsibilities
• Data owners: People who own the information and thus determine the
level of classification for their data and approve its access authorization.
• Data users: People who work with the information to perform their
daily jobs and support the mission of the organization.
Chapter Recap
Introduction to Information Security:
• History of Information security
• Goal of Information Security
• Components of Information system.
• Balancing Information security
• Approaches to information security and Security in SDLC.
• Senior management Roles and Responsibilities
• Security Professionals Responsibilities
• Information Security Project Team
• Data Responsibilities.
END CHAPTER ONE