Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
35Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Cs1014 Information Security

Cs1014 Information Security

Ratings: (0)|Views: 39,480|Likes:
Information Security Notes For Eighth semester
Information Security Notes For Eighth semester

More info:

Published by: Nishanth Krishnamurthy on May 12, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/18/2013

pdf

text

original

 
INFORMATION SECURITY - CS1014
©Einstein College of Engineering
Page 1
CS1014 INFORMATION SECURITY
PREPARED BY
A.SHERLY ALPHONSEL/CSEEINSTEIN COLLEGE OF ENGINEERING
 
INFORMATION SECURITY - CS1014
©Einstein College of Engineering
Page 2
UNIT - 1 : INTRODUCTIONLearning Objectives
Upon completion of this material, you should be able to:
 
Define information security
 
Relate the history of computer security and how it evolved into information security
 
Define key terms and critical concepts of information security as presented in this chapter
 
Discuss the phases of the security systems development life cycle
 
Present the roles of professionals involved in information security within an organization
Introduction
 
 
Information security: a ―well
-informed sense of assurance that the information risks and
controls are in balance.‖ — 
Jim Anderson, Inovant (2002)
 
Necessary to review the origins of this field and its impact on our understanding of information security today
 
INFORMATION SECURITY - CS1014
©Einstein College of Engineering
Page 3
The 1970s and 80s
 
ARPANET grew in popularity as did its potential for misuse
 
Fundamental problems with ARPANET security were identified
 
No safety procedures for dial-up connections to ARPANET
 
Nonexistent user identification and authorization to system
 
Late 1970s: microprocessor expanded computing capabilities and security threats
 
Information security began with Rand Report R-609 (paper that started the study of computer security)
 
Scope of computer security grew from physical security to include:
 
Safety of data
 
Limiting unauthorized access to data
 
Involvement of personnel from multiple levels of an organization
The 1990s
 
Networks of computers became more common; so too did the need to interconnectnetworks
 
Internet became first manifestation of a global network of networks
 
In early Internet deployments, security was treated as a low priorityThe Present
 
The Internet brings millions of computer networks into communication with each other
 — 
many of them unsecured
 
Ability to secure a computer‘s data influenced by the security of every computer to which
it is connected

Activity (35)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
viswaksha liked this
Sarah Ad liked this
Katharyn Mayo liked this
gregsimo liked this
Chris Xenrider liked this
Karthi Keyan added this note
IS
Srikiran Sistla liked this
Srikiran Sistla liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->