Presentation is loading. Please wait.

Presentation is loading. Please wait.

CMIT100 Chapter 15 - Information.

Similar presentations


Presentation on theme: "CMIT100 Chapter 15 - Information."— Presentation transcript:

1 CMIT100 Chapter 15 - Information

2 Learning Objectives Discuss the various forms that information comes in with an introduction to the Data– Information–Knowledge–Wisdom hierarchy. Describe the use of databases, database management systems, and data warehouses. Introduce the field of information security and assurance and the processes used in risk analysis. Discuss the threats to information and solutions in safeguarding information. Describe encryption technologies. Introduce U.S. legislation that facilitates the use of information and protects individuals privacy.

3 DIKW Hierarchy Data Information Knowledge Wisdom
Signals directly received by the person or computer Information Data transformed (processed) into a useful form Knowledge Information that has been applied Wisdom Experience gained from knowledge

4 Information These are business, not technology decisions!
Interpreted (Processed)Data Big Data IT needs to consider: How the information should be stored How (or if) the information should be transmitted What processes we want to use on the data to transform it into information How the information should be viewed/visualized What the requirements for assuring the accuracy of the data and information are What the requirements for assuring the accessibility and security of the data and information are These are business, not technology decisions!

5 Databases Database Management Systems (DBMS) Microsoft Access MySQL
Oracle Microsoft SQL Server Any many more…

6 Relational Databases A database structured to recognize relations among stored items of information Compare to Hierarchical Database

7 Relational Databases Larger example

8 LAB Microsoft Access

9 Information Assurance and Security (IAS)
Focus on how information is utilized Three goals: Confidentiality Integrity Availability

10 Risk Management Risk Assessment Identify Vulnerabilities
Physical Assets Intellectual Property Information Identify Vulnerabilities Identify Threats Implement Policies Monitor

11 Disaster Recovery Disaster Recovery (DR) Plan Prevention Detection

12 Threats Social Engineering Phishing Protocol Attacks Software Exploits
ICMP DOS TCP Hijacking Software Exploits SQL Injection Intrusion Insider Attacks Packet Sniffing

13 Cryptography Encrypting Data Private Key Encryption
Public Key Encryption

14 Certificates Used to verify identity Two types: Self-signed
Third-party signed

15 Laws Many aspects of Information Security are governed by laws
Privacy Act of 1974 Family Education Rights and Privacy Act (FERPA) Health Insurance Portability and Accountability Act (HIPPA) Sarbanes-Oxley Act

16 LAB Examine Certificates

17 Creative Commons Statement


Download ppt "CMIT100 Chapter 15 - Information."

Similar presentations


Ads by Google