Introduction to Information Security

Cards (20)

  • Computer security began immediately after the first mainframes were developed
  • Groups developing code-breaking computations during World War II created the first modern computers
  • Physical controls were needed to limit access to authorized personnel to sensitive military locations
  • Only rudimentary controls were available to defend against physical theft, espionage, and sabotage
  • An Enigma machine is a famous encryption machine used by the Germans during WWII to transmit coded messages.
  • Department of Defense’s Advanced Research Project Agency (ARPA) began examining the feasibility of a redundant networked communications

    1960s
  • ARPANET grew in popularity as did its potential for misuse
    Fundamental problems with ARPANET security were identified
    • No safety procedures for dial-up connections to the ARPANET
    • User identification and authorization to the system were non-existent
    In the late ____ the microprocessor expanded computing capabilities and security threats
    1970s to 1980s
    • Networks of computers became more common, so too did the need to interconnect the networks
    • Resulted in the Internet, the first manifestation of a global network of networks
    • In early Internet deployments, security was treated as a low priority
    1990s
    • The Internet has brought millions of computer networks into communication with each other – many of them unsecured
    • Ability to secure each now influenced by the security on every computer to which it is connected
    The Present
  • “The quality or state of being secure--to be free from danger”
    Security
  • To be protected from adversaries
    Security
  • A successful organization should have multiple layers of security in place:
    • Physical security
    • Personal security
    • Operations security
    • Communications security
    • Network security
  • The protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information
    Information Security
  • Tools, such as policy, awareness, training, education, and technology are necessary
    Information Security
  • The C.I.A. triangle was the standard based on confidentiality, integrity, and availability
  • is a model designed to guide policies for information security within an organization.
    CIA Triad
  • The information is safe from accidental or international disclosure
    Confidentiality
  • The information is safe from accidental or international modification or alteration
    Integrity
  • The information is available to authorized users when needed.
    Availability
  • Information security, therefore, is the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information.