Lecture On safety and security of information systems: Introduction to information systems security
Số trang: 59
Loại file: pdf
Dung lượng: 1.09 MB
Lượt xem: 63
Lượt tải: 0
Xem trước 6 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Lecture "On safety and security of information systems: Introduction to information systems security" provide students with knowledge about: History of information security; Information systems security; Risks, threats, and vulnerabilities;... Please refer to the detailed content of the lecture!
Nội dung trích xuất từ tài liệu:
Lecture On safety and security of information systems: Introduction to information systems security Introduction To Information Systems Security Contents History of information security. Information Systems Security. Risks, Threats, and Vulnerabilities. Tenets of Information Systems Security. The Seven Domains of a Typical IT Infrastructure. 1. History of information security History of information security The 1960s The 1970s and 80s The 1990s 2000 to Present History of information security (cont.) The history of information security begins with computer security Secure physical locations, hardware, and software from threats History of information security (cont.) The 1960s: During the Cold War, many more mainframes were brought online to accomplish more complex and sophisticated tasks. Larry Roberts, known as the founder of the Internet, developed the project which was called ARPANET History of information security (cont.) The 1970s and 80s: Network security ARPANET became popular and more widely used, and the potential for its misuse grew: protect data from unauthorized remote users lack of safety procedures for dial-up connections nonexistent user identification and authorization to the system History of information security (cont.) The 1990s: The Internet has become an interconnection of millions of networks Industry standards for interconnection of networks: de facto standards e-mail encryption History of information security (cont.) 2000 to Present Today, the Internet brings millions of unsecured computer networks into continuous communication with each other. Security? 2. Information Systems Security Information system An information system consists of the hardware, operating system, and application software that work together to collect, process, and store data for individuals and organizations. The Components of Information Systems The Components of Information Systems Hardware: Information systems hardware is the part of an information system you can touch – the physical components of the technology. Computers, keyboards, disk drives, network devices. Software: is a set of instructions that tells the hardware what to do. Software is not tangible – it cannot be touched. Applications, Operating systems The Components of Information Systems Data: as a collection of facts. For example, your street address, the city you live in, and your phone number are all pieces of data. Like software, data is also intangible. People: help-desk workers, systems analysts, programmers. The people involved with information systems are an essential element The Components of Information Systems Procedures: Procedures are written instructions for accomplishing a specific task. Networks: A network is a connected collection of devices that can communicate with each other Information systems security Information systems security is the collection of activities that protect the information system and the data stored in it 3. Risk, Threat, and Vulnerabilitie Risk Risk is the likelihood that something bad will happen to an asset. In the context of IT security, an asset can be a computer, a database, or a piece of information. Examples: Losing data Losing business because a disaster has destroyed your building Failing to comply with laws and regulations Threat A threatis any action that could damage an asset. Information systems face both natural and human-induced threats Examples: Flood, earthquake, fire, … Virus, DDOS
Nội dung trích xuất từ tài liệu:
Lecture On safety and security of information systems: Introduction to information systems security Introduction To Information Systems Security Contents History of information security. Information Systems Security. Risks, Threats, and Vulnerabilities. Tenets of Information Systems Security. The Seven Domains of a Typical IT Infrastructure. 1. History of information security History of information security The 1960s The 1970s and 80s The 1990s 2000 to Present History of information security (cont.) The history of information security begins with computer security Secure physical locations, hardware, and software from threats History of information security (cont.) The 1960s: During the Cold War, many more mainframes were brought online to accomplish more complex and sophisticated tasks. Larry Roberts, known as the founder of the Internet, developed the project which was called ARPANET History of information security (cont.) The 1970s and 80s: Network security ARPANET became popular and more widely used, and the potential for its misuse grew: protect data from unauthorized remote users lack of safety procedures for dial-up connections nonexistent user identification and authorization to the system History of information security (cont.) The 1990s: The Internet has become an interconnection of millions of networks Industry standards for interconnection of networks: de facto standards e-mail encryption History of information security (cont.) 2000 to Present Today, the Internet brings millions of unsecured computer networks into continuous communication with each other. Security? 2. Information Systems Security Information system An information system consists of the hardware, operating system, and application software that work together to collect, process, and store data for individuals and organizations. The Components of Information Systems The Components of Information Systems Hardware: Information systems hardware is the part of an information system you can touch – the physical components of the technology. Computers, keyboards, disk drives, network devices. Software: is a set of instructions that tells the hardware what to do. Software is not tangible – it cannot be touched. Applications, Operating systems The Components of Information Systems Data: as a collection of facts. For example, your street address, the city you live in, and your phone number are all pieces of data. Like software, data is also intangible. People: help-desk workers, systems analysts, programmers. The people involved with information systems are an essential element The Components of Information Systems Procedures: Procedures are written instructions for accomplishing a specific task. Networks: A network is a connected collection of devices that can communicate with each other Information systems security Information systems security is the collection of activities that protect the information system and the data stored in it 3. Risk, Threat, and Vulnerabilitie Risk Risk is the likelihood that something bad will happen to an asset. In the context of IT security, an asset can be a computer, a database, or a piece of information. Examples: Losing data Losing business because a disaster has destroyed your building Failing to comply with laws and regulations Threat A threatis any action that could damage an asset. Information systems face both natural and human-induced threats Examples: Flood, earthquake, fire, … Virus, DDOS
Tìm kiếm theo từ khóa liên quan:
Lecture On safety and security of information systems On safety and security of information systems Introduction to information systems security History of information security Information systems security Bài giảng Bảo mật hệ thống thông tinTài liệu có liên quan:
-
Bài giảng Bảo mật hệ thống thông tin
137 trang 42 0 0 -
Lecture On safety and security of information systems: Symmetric ciphers
41 trang 39 0 0 -
Lecture On safety and security of information systems: Cryptographic hash funtionns
22 trang 35 0 0 -
Lecture On safety and security of information systems: Malicious attacks
39 trang 35 0 0 -
Lecture On safety and security of information systems: Access control
18 trang 34 0 0 -
Lecture Information systems security - Chapter 0: Introdution
8 trang 32 0 0 -
Bài giảng Bảo mật hệ thống thông tin: Chương 7 - ĐH Bách khoa TP HCM
70 trang 32 0 0 -
Bài giảng Bảo mật hệ thống thông tin: Chương 5 - ĐH Bách khoa TP HCM
66 trang 29 0 0 -
Lecture On safety and security of information systems: Firewall
26 trang 29 0 0 -
38 trang 27 0 0