You are on page 1of 16

ITPRF12

Information Assurance and Security -1

School Year 2020-21


First Semester
Instructor: Jen Ducut

fdd
Introduction to Information
Assurance and Security

fdd
8/26/2020 3

Learning Outcomes

• LO 1 - Acquire an understanding of the principles,


concepts and application of Information Assurance
and Security

fdd
8/26/2020 4

Learning Outcomes

• LO 2 - Understand the key terms, critical concepts


and latest developments in Information Assurance
and Security

fdd
Concepts
• Information
- What is it?

fdd
Concepts
• Information
- What is it?
- Why is it important?

fdd
Concepts
• Information
- What is it?
- Why is it important?
- How do we protect (secure) it?

fdd
Why is this important?
• Information is valuable.

fdd
Why is this important?
• Information is valuable.
therefore,
• Information Systems are valuable.
etc…

fdd
Why is this important?
• Information is valuable.
therefore,
• Information Systems are valuable.

• WHAT IS AN INFORMATION SYSTEM ?

fdd
Why is this important?
• Information is valuable.
therefore,
• Information Systems are valuable.
etc…

• Compromise of Information Security Services (C-I-A) have real


consequences (loss)

fdd
Why is this important?
• Information is valuable.
therefore,
• Information Systems are valuable.
etc…

• Compromise of Information Security Services (C-I-A) have real


consequences (loss)
- Confidentiality: death, proprietary info, privacy, theft

fdd
Why is this important?
• Information is valuable.
therefore,
• Information Systems are valuable.
etc…

• Compromise of Information Security Services (C-I-A) have real


consequences (loss)
- Confidentiality: death, proprietary info, privacy, theft
- Integrity: theft, loss of confidence, validity

fdd
Why is this important?
• Information is valuable.
therefore,
• Information Systems are valuable.
etc…

• Compromise of Information Security Services (C-I-A) have real


consequences (loss)
- Confidentiality: death, proprietary info, privacy, theft
- Integrity: theft, loss of confidence, validity
- Availability: lost productivity, disruption of C2, defense,
fdd emergency services
8/26/2020 15

References

– PorWhitman, M.(2017). Management of information


security.USA : Cengage Learning

– Ciampa, Mark (2017). Security Awareness : Applying


Practical Security in your World. Australia : Cengage
Learning

fdd
8/26/2020 16

References

– Doherty, J. (2016). Wireless and mobile device security.


MA :Jones & Bartlett

– Jang, Michael (2017). Security Strategies in Linux


Platforms and Applications : Jones & Bartlett Learning
Information systems security & insurance. Quezon City
:MaxCor Pub. Inc

fdd

You might also like