Lecture-1A Information Security
Lecture-1A Information Security
Introduction to
Information Security
LEARNING OBJECTIVES:
2000 to Present
Today, the Internet brings millions of unsecured computer networks into
continuous communication with each other. The security of each computer’s
stored information is now contingent on the level of security of every other
computer to which it is connected.
What Is Security?
● Information classification
● Secure document storage
● Application of general security policies
● Education of information custodians and end users
Critical Characteristics of Information
• Bottom-up Approach
• Top-down Approach
Approaches to Information Security Implementation
• Senior Management
• Information Security Project Team
• Data Responsibilities
• Communities of Interest
Information Security Project Team
Security as Art
The administrators and technicians who implement security can
be compared to a painter applying oils to canvas. A touch of
color here, a brush stroke there, just enough to represent the
image the artist wants to convey without overwhelming the
viewer, or in security terms, without overly restricting user
access.
Security as Science
Technology developed by computer scientists and
engineers—which is designed for rigorous performance
levels—makes information security a science as well as
an art. Most scientists agree that specific conditions
cause virtually all actions in computer systems.
Security as a Social Science
A third view to consider is information security as a social
science, which integrates some of the components of art
and science and adds another dimension to the discussion.
Social science examines the behavior of individuals as they
interact with systems, whether these are societal systems
or, as in this context, information systems