UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.

Slides:



Advertisements
Similar presentations
Lesson 1: Introduction to IT Business and Careers
Advertisements

Security and Personnel
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Hands-On Ethical Hacking and Network Defense
1 Pertemuan 12 Understanding Computers Carrers and Certifications Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 15 Information Technology Careers.
Careers in IT Farrokh Alemi, Ph.D.. Course on Project Management Credit.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
© Paradigm Publishing Inc Chapter 15 Information Technology Careers.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology.
Dahnish Hussain Assignment 1 Information and Creative Technology.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Security Architecture
Robert LePage 6/4/14. Community Focused Workforce and Economic Development 2 A major component of STCC and HCC role is to support the development of the.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
HELP WANTED? Job prospects for CS Compensation (show me the money) Career networking.
HARARE INSTITUTE OF TECHNOLOGY HIT is Zimbabwe’s most energetic and responsive institute offering unparalleled educational opportunities for those seeking.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 2: Information Security Principles of Success.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Access Control. Assignment Review  Current  Next 6/23/2016 Access Control 2.
HCNA-Security Huawei Certified Network Associate Security (HCNA-Security) validates the basics of network security knowledge and skills to support the.
Access Control. Assignment Review  Current –You decide what categories you want to include. Just provide the required justification.  Next  Detailed.
Sierra Pacific Community College District 7300 College Avenue Sacramento, CA
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
King William High School. Cyber Security Curriculum 4 year high school curriculum Up to 5 technology certifications upon successful completion of each.
Introduction to Management and Organizations
Information Technology
Information Security Principles and Practices
JMU GenCyber Boot Camp Summer, 2016
CS457 Introduction to Information Security Systems
Introduction to Management and Organizations
Chapter 15 Information Technology Careers.
On-Line Meeting 2 October 25, 2016.
Information Security Principles and Practices
The CS Program at UHCL UHCL Spring Open House 2006 March 4, 2006
SY0-401 Exam Dumps CompTIA Security+ Certification Exam
Associate Degree in Cyber security
Emily Clifton Education & Employment Advisor.
CompTIA Security+ CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the.
Introduction to Management and Organizations
Introduction to Management and Organizations
Technology, Careers, and Job Hunting
SY0-501 Dumps PDF CompTIA Security+ Certification Exam.
CIS 333 Competitive Success/snaptutorial.com
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- snaptutorial.com.
CIS 333 Education for Service-- tutorialrank.com.
CIS 333 RANK Education for Service-- cis333rank.com.
CIS 333 Teaching Effectively-- snaptutorial.com
IT Technician Pathway - Cybersecurity
Information Systems in Organizations 1.1 Introduction to MIS
Information Systems in Organizations 1.1 Introduction to MIS
Introduction to Management and Organizations
Computer Security Fundamentals
Introduction to Management and Organizations
Information Systems in Organizations 1.1 Introduction to MIS
YOUR FUTURE AND INFORMATION TECHNOLOGY
Introduction to Management and Organizations
Introduction to Management and Organizations
Information Systems in Organizations 1.1 Introduction to MIS
Professional Services END TO END NETWORK SECURITY SOLUTION
Fundamental Principles of Information Security
Presentation transcript:

UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing Information Security – Information Security Principles of Success.  

Objectives Recognize the growing importance of information security specialists Develop a strategy in the career in information security Comprehend information security in the context of the mission of a business

Introduction To protect computers, networks, and the information they store, organizations are increasingly turning to information security specialists An information security specialist is more than a technician who prevents hackers from attacking a Web site

Growing IT Security Importance and New Career Opportunities Increased services to both end-users and employees create risks to the confidentiality, integrity, and availability of confidential or sensitive data

Becoming an Information Security Specialist Get the right certification Certified Information Systems Security Professional (CISSP) Global Information Assurance Certification (GIAC):www.giac.org Consider earning a graduate degree in INFOSEC Increase your disaster recovery and risk management skills Build a home laboratory Get on a project working with strategic partners Take a second look at government jobs

Becoming an Information Security Specialist contd.. i) Schools Are Responding to Demands Hundreds of community colleges, four-year universities, and post-graduate programs are offering degrees and certificates in emergency preparedness, counterterrorism, and security

Contextualizing Information Security Information security draws upon the best practices and experiences from multiple domains

Contextualizing Information Security contd.. Information Security Careers Meet the Needs of Business To support business operations a number of common positions and career opportunities are needed Security administrators Access coordinators Security architects and network engineers Security consultants Security testers

Information Security Principles of Success. Objectives Build an awareness of 12 basic principles of information security…to help you to determine how these basic principles are applied to real life situations. Distinguish between the three main security goals Learn how to design and apply the principle of “Defense in Depth” Explain the difference between functional and assurance requirements

No two systems are identical in solving the security problems, and no books to consult on how to solve security problems, so you have to depend on principle –based analysis and decision making.

There Is No Such Thing as Absolute Security Principle 1 There Is No Such Thing as Absolute Security

Principle 2 The security goals are Confidentiality, Integrity, and Availability (CIA)

Defense in Depth as Strategy Principle 3 Defense in Depth as Strategy

Principle 4 When Left on Their Own, People Tend to Make the Worst Security Decisions

Principle 5 Computer Security Depends on Two types of Requirements: Functional and Assurance Requirements

Security Through Obscurity Is Not an Answer Principle 6 Security Through Obscurity Is Not an Answer

Security = Risk Management Principle 7 Security = Risk Management

Security Controls: Preventative, Principle 8 Security Controls: Preventative, Detective, and Responsive

Complexity I of Security Principle 9 Complexity Is The Enemy of Security

Principle 10 Fear Uncertainty Doubt Do Not Work in Selling Security

Technology Are All Needed Principle 11 People, Process Technology Are All Needed

Open Disclosure of Vulnerabilities Is Good for Security Principle 12 Open Disclosure of Vulnerabilities Is Good for Security

Summary Computer security specialists must not only know the technical side of their jobs but also must understand the principles behind information security These principles are mixed and matched to describe why certain security functions and operations exist in the real world of IT