Download presentation
Presentation is loading. Please wait.
Published byWilhelm Hase Modified over 6 years ago
1
IT Vocab IT = information technology Server Client or host
Public – open access Private – limited access Client or host Thin - diskless Workstation – fully functioning computer system
2
IT Vocab A computing system : a configuration of one or more computers along with the software and data.
3
Tenets of IT Security CS5493
4
A I C Availability - assets are available in a timely manner.
Integrity – assets remain in their expected states. Confidentiality - assets have access controls
5
What are assets? An asset is something of value: Hardware Software
Data Employees Equipment Etc.
6
AIC and Threat Categories
Denial or destruction threats Alteration threats Improper disclosure threats
7
The Domains of IT Infrastructure
User domain Workstation domain LAN domain LAN-to-WAN domain WAN domain Remote Access domain Server (System)/Application domain
8
Domain Breakdown The IT infrastructure is broken into different domains so security policy can be organized effectively.
9
IT Domain Security Policy
A comprehensive security plan can be devised by considering each separate domain. Identify the threats and vulnerabilities Devise a strategy for eliminating the vulnerabilities.
10
Vulnerabilities Examples:
User – lack of awareness or concern for security policy. Workstation domain – unauthorized access LAN – spreading of malicious software WAN – malicious attacks by anonymous sources Remote access – Data leakage due to loss or theft of electronic devise Server/App – Data loss due to software and hardware failures.
11
Domain Threat Targets User – misuse of resources, social engineering
Workstation – OS, applications LAN – hubs, cables, supporting software, etc. WAN – routers, firewalls, supporting software, etc. Remote Access – VPN Server Application – , file services, database, etc.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.