Week#01.... Lecture#01
Week#01.... Lecture#01
Security
SE-308
Course Books
Introduction to information
security
– Introduction
– History of an information security
– What is security
– How to achieve security
– Key information security concepts
– Components of information systems
– Information Flow
Introduction
Prevention
– Prevent attackers from violating security policy
Detection
– Detect attackers’ violation of security policy
Recovery
– Stop attack, assess and repair damage
Survivability
– Continue to function correctly even if attack
succeeds
Security Measures
Technology
– Hardware/software used to ensure security
• Authenticity:
Information should be real and trustworthy, and come
from reliable sources
• Confidentiality
Sensitive information should be protected from
unauthorized access or disclosure.
Critical Characteristics of
Information
• Integrity
Information must remain whole, accurate, and
uncorrupted to maintain trustworthiness.
• Possession
Refers to legal ownership or control over information
assets.
• Accuracy
Information must be free from errors or inaccuracies,
correctly representing real-world phenomena
Thank you!