Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Chapter 1: The Context of SA&D Methods
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cryptography and Network Security Chapter 1
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
Lecture 1: Overview modified from slides of Lawrie Brown.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
 What are systems analysis and design?  Where do systems analysts work?  What modern business and technology trends are affecting information systems.
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
Computer ethics.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Business Ethics Why should business ethics concern you?
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
ACM 511 Introduction to Computer Networks. Computer Networks.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Ethics Business Law Sunny Hills High School Mrs. Larsen.
ICS131 – Ethics 11/17/03. IEEE-CS and ACM 1.PUBLIC - Software engineers shall act consistently with the public.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
 byte  short  int  long  float  double  boolean  char.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
CS457 Introduction to Information Security Systems
Chapter 16 – Careers in Information Technology
Information System and Network Security
Internet Etiquette or Netiquette
Unit 3- Introduction to Computer Ethics
Introduction to Cryptography
Presentation transcript:

Introduction to Information Security Module 1

Objectives Definitions of information technology and information security Fundamental Security Concepts Ethics of IT Security

Definitions Information Technology Term used to describe computers and automated data processing Information Security Protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability

CIA Triad Fundamental Characteristics Confidentiality Only those that should have access to data do Integrity Ensures the data has not be changed Availability Data is accessible when needed

Confidentiality Assurance of data privacy Only the intended and authorized recipients (individuals, processes, or devices) may access and read the data. Disclosure to unauthorized entities, for example using unauthorized network sniffing, is a confidentiality violation. Often provided through the use of cryptographic techniques

Integrity Data integrity Assurance that the information has not been altered or corrupted in transmission from source to destination, willfully or accidentally, before it is read by its intended recipient. Source integrity Assurance the sender of the information is who it is supposed to be. Source integrity may be compromised when an agent spoofs its identity and supplies incorrect information to a recipient. Digital Signatures and hash algorithms are mechanisms used to provide data integrity

Availability Timely and reliable access to data services by authorized users It ensures information or resources are available when needed; at a rate which is fast enough for the system to perform its intended task While confidentiality and integrity can be protected, an attacker may cause resources to become less available than required, or not available at all Robust protocols and operating systems, redundant network architectures, and system hardware without any single points of failure help to ensure system reliability and robustness A Denial of Service (DoS) attack is an attack against availability

Ethics of IT Security Ten Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10.Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans.

Ethics of IT Security Be a Good Online Citizen Safer for me, more secure for all: What you do online has the potential to affect everyone – at home, at work and around the world. Practicing good online habits benefits the global digital community. Respect other online citizens: Post only about others as you would have them post about you. Reference and Acknowledgment: Represent authorship and reference others when using their ideas. Help the authorities fight cyber crime: Report stolen finances or identities and other cybercrime to (Internet Crime Complaint Center), the Federal Trade Commission at

Ethics of IT Security For more on online safety introduction.aspx

True or False 1. Information security describes non-repudiation, availability, and confidentiality of computer systems. 2. An IT Security professional with authorized access is expected to snoop around their coworker’s personal computer files. 3. Confidentiality, integrity, and availability are the fundamental concepts behind information security. 4. If data is not accessible, it is still secure as long as it has not been altered or deleted. 5. It is the responsibility of people who create and use the technology to make sure that it is utilized in a responsible and ethical manner. 6. Validation of sender is not necessary, as long as data is sent over a secure channel.

True or False 1. Information security describes non-repudiation, availability, and confidentiality of computer systems. TRUE 2. An IT Security professional with authorized access is expected to snoop around their coworker’s personal computer files. FALSE 3. Confidentiality, integrity, and availability are the fundamental concepts behind information security. TRUE 4. If data is not accessible, it is still secure as long as it has not been altered or deleted. FALSE 5. It is the responsibility of people who create and use the technology to make sure that it is utilized in a responsible and ethical manner. TRUE 6. Validation of sender is not necessary, as long as data is sent over a secure channel. FALSE

Summary Provided background on fundamental security concepts creating a framework of how to protect information systems Defined information technology and information security Discussed IT Ethics

List of References pdf system-ethics-information-security_54 ents/STC%20tips%20and%20advice_0.pdf