6: Information Systems Security
-
-
Last updated
-
-
Save as PDF
-
Learning Objectives
Upon completion of this chapter, you will be able to:
-
Identify the information security triad
-
Explain the motivations of the threat actors
-
Define the potential impact of network security attacks
-
Describe the functions of a Security Operations Center (SOC)
-
Explain security policies
We discuss the information security triad of confidentiality, integrity, and availability. We will review different types of threats and associated costs for individuals, organizations, and nations. We will discuss different security tools and technologies, how security operation centers can secure organizations’ resources and assets, and a primer on personal information security.
-
-
6.1: Introduction
-
Despite technology being convenient, it can also be used against us and threaten our devices' security.
-
-
6.2: The Information Security Triad- Confidentiality, Integrity, Availability (CIA)
-
With power comes responsibility, and the internet comes with responsibility which includes integrity, confidentiality, and availability, which ensure each individual's safety and security.
-
-
6.3: Tools for Information Security
-
To ensure the confidentiality, integrity, and availability of information, organizations can choose from various tools.
-
-
6.4: Threat Impact
-
Personally identifiable information (PII) protects people from identity fraud, credit card fraud, etc.
-
-
6.5: Fighters in the War Against Cybercrime- The Modern Security Operations Center
-
Like real-life crime, cybercrime exists, and Security Operations Center safeguards companies from internal and external threats.
-
-
6.6: Security vs. Availability
-
Much of the business networks will be up and running. Security staff recognizes that network stability must be maintained for the company to achieve its goals.
-
-
6.7: Summary
-
-
-
6.8: Study Questions
-