0% found this document useful (0 votes)
25 views10 pages

Introduction To Information Security: J. Kasiroori Department of Analytics and Informatics

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views10 pages

Introduction To Information Security: J. Kasiroori Department of Analytics and Informatics

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Introduction to

Information
Security
J. Kasiroori
Department of Analytics and
Informatics
Define • Information security

Understan • The information security in


business
d
• the importance of information
Explain security to business

Objectives Understan • the tradeoff between information


security and productivity
d
• the models for discussing
Describe information security

• the Information Systems Risk


Describe Management process

Understan • the concept of Defense in depth in


information security
d
Module Structure
Unit 1 – Introduction to Information
security

• Introduction to Information Security


• General Concepts in security
• Security Goals
• Attacks on information and data
• Vulnerabilities in Information Systems
• Security Services and mechanisms
Identification

Unit 2 - Authentication

Building Authorisation

Controll Access Controls

ed Auditing and Accountability

Access Models for discussing CIA Triad and the


security issues Parkerian Hexad
Unit 3: Cryptography

• Introduction to
cryptography
• Modern cryptographic tools
• Symmetric Encryption
• Asymmetric encryption
• Protecting data at rest, in
motion, and in use
Unit 3 - Web and
Database Security
Techniques

SQL Injection

Cross Site Scripting

Database privileges

Multilevel databases

Query modification
Social engineering and Phishing
Attacks
Unit 4: Types of security

Operations security

Physical security

Network security

Operating system security

Application security
Quiz

Why is information regarded as an important asset? Discuss


using real world examples. [20]
Reading • Security in Computing, Fourth
Edition, by Charles P. Pfleeger,
Material Pearson Education

You might also like