NTW600 Introduction To Cyber Security
NTW600 Introduction To Cyber Security
Security
Week 1: Introduction to Cybersecurity
Whitman, M.E. and Mattord, H.J., 2021. Principles of information security. Cengage learning.
Assessments
2
Learning Resources
• Text Book: Whitman, M.E. and Mattord, H.J., 2021. Principles of information
security. Cengage learning.
3
Academic Integrity
• You must take responsibility for ensuring at all times that you follow appropriate academic
practices, particularly when it comes to preparing assessment items.
• Plagiarism is unacceptable as it is contrary to the principle that students must present their
own assessment.
4
Objectives:
5
The History of Information Security
First
mainfram ARPANET Informa
1960
1950 e Develope 1983 tion
s
computer d Security
produced
Informa IoT
Enterpris Security
tion
e 2010
1988 System 1995
Protectio s Wearabl
s n e
Security Security
6
Illustration of Computer Network
Vulnerabilities
7
What is Security?
Physical
Operations People Functions Communicatio Information
Infrastructure
n
8
C.I.A Triad & Components of Information Security
9
C.I.A Triad & Components of Information Security
10
C.I.A Triad & Components of Information Security
Layer Description
11
C.I.A Triad & Components of Information Security
12
C.I.A Triad & Components of Information Security
• Vulnerability
• Threat vector
• Risk
• Avoid – identifying risk but making the decision to not engage in the activity
Attack vector Climb through hole in fence Access web server passwords through
flaw in operating system
14
C.I.A Triad & Components of Information Security
15
Key Cyber Security Concepts
Threat
source
16
Critical Characteristics of Information
17
Critical Characteristics of Information cont.
18
Components of an Information System
• Information Systems are the entire set of people,
procedures, and technology that enable the
business to use information.
19
Security Professionals and the Organization
20
Senior Management
22
Data Responsibilities
23
Information Security Project Team
• A small functional team of people who are experienced in one or
multiple facets of required technical and nontechnical areas:
• Champion
• Team leader
• Security professionals
• Systems administrators
• End users.
24
Balancing Information Security and Access
• Security should be
considered a balance
between protection and
availability.
25
Class Activity One - Time Allowed: 20 min
• Using the internet, find out about one of the latest Cyber
Security attacks and report on the following:
27
Security in the Systems Development Life Cycle (SDLC)
28
Security in the SDLC
2. Development/Acquisition
3. Implementation/Assessment
4. Operation/Maintenance
5. Disposal
29
Security in SDLC cont.
Phase 1
Initiation
30
Security in SDLC cont.
Phase 2
Development
31
Security in SDLC cont.
Phase 3
Implementati
on
32
Security in SDLC cont.
Phase 4
Operation
33
Security in SDLC cont.
Phase 5
Disposal
34
Class Activity Two - Time Allowed: 20 min
36
Next Week – What’s Coming Up?
Suggested Reading:
• Textbook Chapter 2