Download presentation
Presentation is loading. Please wait.
1
CMIT100 Chapter 15 - Information
2
Learning Objectives Discuss the various forms that information comes in with an introduction to the Data– Information–Knowledge–Wisdom hierarchy. Describe the use of databases, database management systems, and data warehouses. Introduce the field of information security and assurance and the processes used in risk analysis. Discuss the threats to information and solutions in safeguarding information. Describe encryption technologies. Introduce U.S. legislation that facilitates the use of information and protects individuals privacy.
3
DIKW Hierarchy Data Information Knowledge Wisdom
Signals directly received by the person or computer Information Data transformed (processed) into a useful form Knowledge Information that has been applied Wisdom Experience gained from knowledge
4
Information These are business, not technology decisions!
Interpreted (Processed)Data Big Data IT needs to consider: How the information should be stored How (or if) the information should be transmitted What processes we want to use on the data to transform it into information How the information should be viewed/visualized What the requirements for assuring the accuracy of the data and information are What the requirements for assuring the accessibility and security of the data and information are These are business, not technology decisions!
5
Databases Database Management Systems (DBMS) Microsoft Access MySQL
Oracle Microsoft SQL Server Any many more…
6
Relational Databases A database structured to recognize relations among stored items of information Compare to Hierarchical Database
7
Relational Databases Larger example
8
LAB Microsoft Access
9
Information Assurance and Security (IAS)
Focus on how information is utilized Three goals: Confidentiality Integrity Availability
10
Risk Management Risk Assessment Identify Vulnerabilities
Physical Assets Intellectual Property Information Identify Vulnerabilities Identify Threats Implement Policies Monitor
11
Disaster Recovery Disaster Recovery (DR) Plan Prevention Detection
12
Threats Social Engineering Phishing Protocol Attacks Software Exploits
ICMP DOS TCP Hijacking Software Exploits SQL Injection Intrusion Insider Attacks Packet Sniffing
13
Cryptography Encrypting Data Private Key Encryption
Public Key Encryption
14
Certificates Used to verify identity Two types: Self-signed
Third-party signed
15
Laws Many aspects of Information Security are governed by laws
Privacy Act of 1974 Family Education Rights and Privacy Act (FERPA) Health Insurance Portability and Accountability Act (HIPPA) Sarbanes-Oxley Act
16
LAB Examine Certificates
17
Creative Commons Statement
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.