SlideShare a Scribd company logo
Chapter 1: Information Security
Fundamentals
Security+ Guide to Network Security
Fundamentals
Second Edition
’
Security+ Guide to Network Security
Fundamentals, 2e
Objectives
• Identify the challenges for information security
• Define information security
• Explain the importance of information security
• List and define information security terminology
• Describe the CompTIA Security+ certification exam
• Describe information security careers
³
Security+ Guide to Network Security
Fundamentals, 2e
• Computer Emergency Response Team (CERT)
security organization compiles statistics regarding
number of reported attacks, including:
– Speed of attacks
– Sophistication of attacks
– Faster detection of weaknesses
– Distributed attacks
– Difficulties of patching
Identifying the Challenges for
Information Security (continued)
Identifying the Challenges for
Information Security (continued)
9
Security+ Guide to Network Security
Fundamentals, 2e
Identifying the Challenges for
Information Security (continued)
‘
Security+ Guide to Network Security
Fundamentals, 2e
T
Security+ Guide to Network Security
Fundamentals, 2e
• Information security:
– Tasks of guarding digital information, which is typically
processed by a computer, stored on a storage device,
and transmitted over a network spacing
Defining Information Security
(continued)
R
Security+ Guide to Network Security
Fundamentals, 2e
• Information security is intended to protect information
that has value to people and organizations
– This value comes from the characteristics of the
information:
• Confidentiality
• Integrity
• Availability
• Information security is achieved through a
combination of three entities
Defining Information Security
(continued)
’t
Security+ Guide to Network Security
Fundamentals, 2e
• Confidentiality: Prevention of unauthorized disclosure
of information. Or keeping unwanted parties from
accessing assets of a computer system Also known
as: secrecy or privacy
• Integrity: Prevention of unauthorized modification of
information.
• Availability: Prevention of unauthorized withholding of
information or resources. Or keeping system
available
Defining Information Security
(continued)
Defining Information Security
(continued)
’’
Security+ Guide to Network Security
Fundamentals, 2e
Defining Information Security
(continued)
’’
Security+ Guide to Network Security
Fundamentals, 2e
’‘
Security+ Guide to Network Security
Fundamentals, 2e
• A more comprehensive definition of information
security is:
– That which protects the integrity, confidentiality, and
availability of information on the devices that store,
manipulate, and transmit the information through
products, people, and procedures
Defining Information Security
(continued)
’³
Security+ Guide to Network Security
Fundamentals, 2e
Understanding the Importance of
Information Security
• Information security is important to businesses:
– Prevents data theft
– Avoids legal consequences of not securing information
– Maintains productivity
– Foils cyberterrorism
– Thwarts identity theft
’9
Security+ Guide to Network Security
Fundamentals, 2e
Preventing Data Theft
• Security often associated with theft prevention
• Drivers install security systems on their cars to
prevent the cars from being stolen
• Same is true with information security—businesses
cite preventing data theft as primary goal of
information security
’‘
Security+ Guide to Network Security
Fundamentals, 2e
Preventing Data Theft (continued)
• Theft of data is single largest cause of financial loss
due to a security breach
• One of the most important objectives of information
security is to protect important business and personal
data from theft
’T
Security+ Guide to Network Security
Fundamentals, 2e
Avoiding Legal Consequences
• Businesses that fail to protect data may face serious
penalties
• Laws include:
– The Health Insurance Portability and Accountability Act
of 1996 (HIPAA)
– The Sarbanes-Oxley Act of 2002 (Sarbox)
– The Cramm-Leach-Blilely Act (GLBA)
– USA PATRIOT Act 2001
’M
Security+ Guide to Network Security
Fundamentals, 2e
Maintaining Productivity
• After an attack on information security, clean-up
efforts divert resources, such as time and money
away from normal activities
• A Corporate IT Forum survey of major corporations
showed:
– Each attack costs a company an average of $213,000
in lost man-hours and related costs
– One-third of corporations reported an average of more
than 3,000 man-hours lost
Maintaining Productivity (continued)
’R
Security+ Guide to Network Security
Fundamentals, 2e
’t
Security+ Guide to Network Security
Fundamentals, 2e
• An area of growing concern among defense experts
are surprise attacks by terrorist groups using
computer technology and the Internet
(cyberterrorism)
• These attacks could cripple a nation’s electronic and
commercial infrastructure
• Our challenge in combating cyberterrorism is that
many prime targets are not owned and managed by
the federal government
Foiling Cyberterrorism
’’
Security+ Guide to Network Security
Fundamentals, 2e
Thwarting Identity Theft
• Identity theft involves using someone’s personal
information, such as social security numbers, to
establish bank or credit card accounts that are then
left unpaid, leaving the victim with the debts and
ruining their credit rating
• National, state, and local legislation continues to be
enacted to deal with this growing problem
– The Fair and Accurate Credit Transactions Act of 2003 is
a federal law that addresses identity theft
’’
Security+ Guide to Network Security
Fundamentals, Third Edition
Information Security Terminology
(continued)
• Asset
– Something that has a value
• Threat
– An event or object that may defeat the security measures
in place and result in a loss
• Threat agent
– A person or thing that has the power to carry out a threat
’‘
Security+ Guide to Network Security
Fundamentals, Third Edition
Information Security Terminology
(continued)
• Vulnerability
– Weakness that allows a threat agent to bypass security
• Risk
– The likelihood that a threat agent will exploit a vulnerability
– Realistically, risk cannot ever be entirely eliminated
Information Security Terminology
(continued)
’³
Security+ Guide to Network Security
Fundamentals, Third Edition
Information Security Terminology
(continued)
’9
Security+ Guide to Network Security
Fundamentals, Third Edition
’‘
Security+ Guide to Network Security
Fundamentals, 2e
Exploring the CompTIA Security+
Certification Exam (continued)
• Since 1982, the Computing Technology Industry
Association (CompTIA) has been working to advance
the growth of the IT industry
• CompTIA is the world’s largest developer of vendor-
neutral IT certification exams
• The CompTIA Security+ certification tests for mastery
in security concepts and practices
’T
Security+ Guide to Network Security
Fundamentals, 2e
Exploring the CompTIA Security+
Certification Exam (continued)
• The Security+ exam is an internationally recognized
validation of foundation-level security skills and knowledge
Used by organizations and security professionals around
the world
• The six domains covered by the Security+ exam:
– Systems Security, Network Infrastructure, Access Control,
Assessments and Audits, Cryptography, and
Organizational Security
’M
Security+ Guide to Network Security
Fundamentals, 2e
Surveying Information Security
Careers
• Information security is one of the fastest growing
career fields
• As information attacks increase, companies are
becoming more aware of their vulnerabilities and are
looking for ways to reduce their risks and liabilities
’R
Security+ Guide to Network Security
Fundamentals, 2e
Surveying Information Security
Careers (continued)
• Sometimes divided into three general roles:
– Security manager develops corporate security plans
and policies, provides education and awareness, and
communicates with executive management about
security issues
– Security engineer designs, builds, and tests security
solutions to meet policies and address business needs
– Security administrator configures and maintains
security solutions to ensure proper service levels and
availability
‘t
Security+ Guide to Network Security
Fundamentals, 2e
Summary
• The challenge of keeping computers secure is
becoming increasingly difficult
• Attacks can be launched without human intervention
and infect millions of computers in a few hours
• Information security protects the integrity,
confidentiality, and availability of information on the
devices that store, manipulate, and transmit the
information through products, people, and
procedures
‘’
Security+ Guide to Network Security
Fundamentals, 2e
Summary (continued)
• Information security has its own set of terminology
• A threat is an event or an action that can defeat
security measures and result in a loss
• Many organizations use the CompTIA Security+
certification to verify security competency

More Related Content

PPT
Principles of information security Chapter 1 (1).ppt
PPT
Chapter 1 (1) (1).pptghtrtt76utrurtutrut
PDF
Cybersecurity Roadmap Development for Executives
PDF
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
PDF
CyberSecurity.pdf
PPT
Intro to Security
PPTX
Lecture 3 Country Specific Strategy.pptx
PPTX
Information management unit 4 security,control and reporting
Principles of information security Chapter 1 (1).ppt
Chapter 1 (1) (1).pptghtrtt76utrurtutrut
Cybersecurity Roadmap Development for Executives
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
CyberSecurity.pdf
Intro to Security
Lecture 3 Country Specific Strategy.pptx
Information management unit 4 security,control and reporting

Similar to Information security principles chapter 1 (20)

PPTX
Module 1Introduction to cyber security.pptx
PPTX
cybersecurityandthe importance of the that
PPTX
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
PPTX
All About Network Security & its Essentials.pptx
PPTX
Topic11
PPTX
ICS_Unit-I_Foundations of Information Security
PDF
Exploring Cybersecurity Services: Types, Relevance, and Becoming a Pro
PPTX
Security in IT (data and cyber security)
PDF
Cybersecurity and continuous intelligence
PPTX
Cyber security
PDF
Advance Your Career with Cyber Security Training in Kerala
PPTX
Information security[277]
PPTX
1_Introduction to security.pptx
PPT
2 Security And Internet Security
PPTX
security in it (data and cyber security)
PDF
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
PDF
Cyber security for Developers
PDF
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
PPTX
unit-1-is1.pptx
PDF
Introduction to Cyber Security.pdf file.
Module 1Introduction to cyber security.pptx
cybersecurityandthe importance of the that
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
All About Network Security & its Essentials.pptx
Topic11
ICS_Unit-I_Foundations of Information Security
Exploring Cybersecurity Services: Types, Relevance, and Becoming a Pro
Security in IT (data and cyber security)
Cybersecurity and continuous intelligence
Cyber security
Advance Your Career with Cyber Security Training in Kerala
Information security[277]
1_Introduction to security.pptx
2 Security And Internet Security
security in it (data and cyber security)
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
Cyber security for Developers
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
unit-1-is1.pptx
Introduction to Cyber Security.pdf file.
Ad

More from EstherBaguma (12)

PDF
Information Systems chapter 2 - Organizations
PPT
Information Systems chapter 1 - Introduction
PPT
Chapter 3 Principles of Info Security.ppt
PPT
chp 6_ethical_and_security_issues_in_is.ppt
PPT
Principles of information security Chapter 5.ppt
PPT
Principles of information security chp 4.ppt
PPT
Principles of information security ch03_1.ppt
PPT
Principles of information security ch02_2.ppt
PPT
Introduction to Software engineeringSE chp_04.ppt
PPT
Introduction to Software engineeringPSE-Chp 05.ppt
PPT
Introduction to principles of software engineering chp_04.ppt
PPT
Introduction to principles of software engineeringWhy1and2
Information Systems chapter 2 - Organizations
Information Systems chapter 1 - Introduction
Chapter 3 Principles of Info Security.ppt
chp 6_ethical_and_security_issues_in_is.ppt
Principles of information security Chapter 5.ppt
Principles of information security chp 4.ppt
Principles of information security ch03_1.ppt
Principles of information security ch02_2.ppt
Introduction to Software engineeringSE chp_04.ppt
Introduction to Software engineeringPSE-Chp 05.ppt
Introduction to principles of software engineering chp_04.ppt
Introduction to principles of software engineeringWhy1and2
Ad

Recently uploaded (20)

PPTX
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
PDF
.pdf is not working space design for the following data for the following dat...
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PPTX
A Quantitative-WPS Office.pptx research study
PPTX
Business Acumen Training GuidePresentation.pptx
PPTX
Computer network topology notes for revision
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPT
Quality review (1)_presentation of this 21
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
Supervised vs unsupervised machine learning algorithms
PPTX
Major-Components-ofNKJNNKNKNKNKronment.pptx
PPT
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
PPTX
Database Infoormation System (DBIS).pptx
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
.pdf is not working space design for the following data for the following dat...
oil_refinery_comprehensive_20250804084928 (1).pptx
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
A Quantitative-WPS Office.pptx research study
Business Acumen Training GuidePresentation.pptx
Computer network topology notes for revision
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Clinical guidelines as a resource for EBP(1).pdf
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
Introduction-to-Cloud-ComputingFinal.pptx
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
STUDY DESIGN details- Lt Col Maksud (21).pptx
Quality review (1)_presentation of this 21
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
Supervised vs unsupervised machine learning algorithms
Major-Components-ofNKJNNKNKNKNKronment.pptx
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
Database Infoormation System (DBIS).pptx
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx

Information security principles chapter 1

  • 1. Chapter 1: Information Security Fundamentals Security+ Guide to Network Security Fundamentals Second Edition
  • 2. ’ Security+ Guide to Network Security Fundamentals, 2e Objectives • Identify the challenges for information security • Define information security • Explain the importance of information security • List and define information security terminology • Describe the CompTIA Security+ certification exam • Describe information security careers
  • 3. ³ Security+ Guide to Network Security Fundamentals, 2e • Computer Emergency Response Team (CERT) security organization compiles statistics regarding number of reported attacks, including: – Speed of attacks – Sophistication of attacks – Faster detection of weaknesses – Distributed attacks – Difficulties of patching Identifying the Challenges for Information Security (continued)
  • 4. Identifying the Challenges for Information Security (continued) 9 Security+ Guide to Network Security Fundamentals, 2e
  • 5. Identifying the Challenges for Information Security (continued) ‘ Security+ Guide to Network Security Fundamentals, 2e
  • 6. T Security+ Guide to Network Security Fundamentals, 2e • Information security: – Tasks of guarding digital information, which is typically processed by a computer, stored on a storage device, and transmitted over a network spacing Defining Information Security (continued)
  • 7. R Security+ Guide to Network Security Fundamentals, 2e • Information security is intended to protect information that has value to people and organizations – This value comes from the characteristics of the information: • Confidentiality • Integrity • Availability • Information security is achieved through a combination of three entities Defining Information Security (continued)
  • 8. ’t Security+ Guide to Network Security Fundamentals, 2e • Confidentiality: Prevention of unauthorized disclosure of information. Or keeping unwanted parties from accessing assets of a computer system Also known as: secrecy or privacy • Integrity: Prevention of unauthorized modification of information. • Availability: Prevention of unauthorized withholding of information or resources. Or keeping system available Defining Information Security (continued)
  • 9. Defining Information Security (continued) ’’ Security+ Guide to Network Security Fundamentals, 2e
  • 10. Defining Information Security (continued) ’’ Security+ Guide to Network Security Fundamentals, 2e
  • 11. ’‘ Security+ Guide to Network Security Fundamentals, 2e • A more comprehensive definition of information security is: – That which protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures Defining Information Security (continued)
  • 12. ’³ Security+ Guide to Network Security Fundamentals, 2e Understanding the Importance of Information Security • Information security is important to businesses: – Prevents data theft – Avoids legal consequences of not securing information – Maintains productivity – Foils cyberterrorism – Thwarts identity theft
  • 13. ’9 Security+ Guide to Network Security Fundamentals, 2e Preventing Data Theft • Security often associated with theft prevention • Drivers install security systems on their cars to prevent the cars from being stolen • Same is true with information security—businesses cite preventing data theft as primary goal of information security
  • 14. ’‘ Security+ Guide to Network Security Fundamentals, 2e Preventing Data Theft (continued) • Theft of data is single largest cause of financial loss due to a security breach • One of the most important objectives of information security is to protect important business and personal data from theft
  • 15. ’T Security+ Guide to Network Security Fundamentals, 2e Avoiding Legal Consequences • Businesses that fail to protect data may face serious penalties • Laws include: – The Health Insurance Portability and Accountability Act of 1996 (HIPAA) – The Sarbanes-Oxley Act of 2002 (Sarbox) – The Cramm-Leach-Blilely Act (GLBA) – USA PATRIOT Act 2001
  • 16. ’M Security+ Guide to Network Security Fundamentals, 2e Maintaining Productivity • After an attack on information security, clean-up efforts divert resources, such as time and money away from normal activities • A Corporate IT Forum survey of major corporations showed: – Each attack costs a company an average of $213,000 in lost man-hours and related costs – One-third of corporations reported an average of more than 3,000 man-hours lost
  • 17. Maintaining Productivity (continued) ’R Security+ Guide to Network Security Fundamentals, 2e
  • 18. ’t Security+ Guide to Network Security Fundamentals, 2e • An area of growing concern among defense experts are surprise attacks by terrorist groups using computer technology and the Internet (cyberterrorism) • These attacks could cripple a nation’s electronic and commercial infrastructure • Our challenge in combating cyberterrorism is that many prime targets are not owned and managed by the federal government Foiling Cyberterrorism
  • 19. ’’ Security+ Guide to Network Security Fundamentals, 2e Thwarting Identity Theft • Identity theft involves using someone’s personal information, such as social security numbers, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating • National, state, and local legislation continues to be enacted to deal with this growing problem – The Fair and Accurate Credit Transactions Act of 2003 is a federal law that addresses identity theft
  • 20. ’’ Security+ Guide to Network Security Fundamentals, Third Edition Information Security Terminology (continued) • Asset – Something that has a value • Threat – An event or object that may defeat the security measures in place and result in a loss • Threat agent – A person or thing that has the power to carry out a threat
  • 21. ’‘ Security+ Guide to Network Security Fundamentals, Third Edition Information Security Terminology (continued) • Vulnerability – Weakness that allows a threat agent to bypass security • Risk – The likelihood that a threat agent will exploit a vulnerability – Realistically, risk cannot ever be entirely eliminated
  • 22. Information Security Terminology (continued) ’³ Security+ Guide to Network Security Fundamentals, Third Edition
  • 23. Information Security Terminology (continued) ’9 Security+ Guide to Network Security Fundamentals, Third Edition
  • 24. ’‘ Security+ Guide to Network Security Fundamentals, 2e Exploring the CompTIA Security+ Certification Exam (continued) • Since 1982, the Computing Technology Industry Association (CompTIA) has been working to advance the growth of the IT industry • CompTIA is the world’s largest developer of vendor- neutral IT certification exams • The CompTIA Security+ certification tests for mastery in security concepts and practices
  • 25. ’T Security+ Guide to Network Security Fundamentals, 2e Exploring the CompTIA Security+ Certification Exam (continued) • The Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge Used by organizations and security professionals around the world • The six domains covered by the Security+ exam: – Systems Security, Network Infrastructure, Access Control, Assessments and Audits, Cryptography, and Organizational Security
  • 26. ’M Security+ Guide to Network Security Fundamentals, 2e Surveying Information Security Careers • Information security is one of the fastest growing career fields • As information attacks increase, companies are becoming more aware of their vulnerabilities and are looking for ways to reduce their risks and liabilities
  • 27. ’R Security+ Guide to Network Security Fundamentals, 2e Surveying Information Security Careers (continued) • Sometimes divided into three general roles: – Security manager develops corporate security plans and policies, provides education and awareness, and communicates with executive management about security issues – Security engineer designs, builds, and tests security solutions to meet policies and address business needs – Security administrator configures and maintains security solutions to ensure proper service levels and availability
  • 28. ‘t Security+ Guide to Network Security Fundamentals, 2e Summary • The challenge of keeping computers secure is becoming increasingly difficult • Attacks can be launched without human intervention and infect millions of computers in a few hours • Information security protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures
  • 29. ‘’ Security+ Guide to Network Security Fundamentals, 2e Summary (continued) • Information security has its own set of terminology • A threat is an event or an action that can defeat security measures and result in a loss • Many organizations use the CompTIA Security+ certification to verify security competency