Professional Documents
Culture Documents
INTRODUCTION TO
INFORMATION ASSURANCE
Lesson 1
AND SECURITY
An Overview on
IAS
ACCESS SECURITY
SECURITY GOALS
VULNERABILITY EXPLOIT
THREAT
RISK
ASSETS
IMPACT
ASSETS
Everything that have value for an organization
or impact its business continuity.
THREAT
RISK
Resources within the system are prone for RISK = Threat x Vulnerability x Impact
illegal access/modify/damage by intruder
Use encryption software that scambles information
you send over the internet
AVOID PHISHING SOLUTION
CALL COMPANY
REPRESENTATIV
ES
If there is suspicious warnings
it is best to confirm from
the company itself.
ASSIGNMENTS?
QUESTIONS: