We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6
SECURITY
Introduction to Information Security
1.Definition and Scope What is Information Security? • Information Security refers to the practice of protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The goal is to ensure the confidentiality, integrity, and availability of data, whether it's in storage, processing, or transit. Importance of Information Security • Protects Sensitive Data: Safeguards personal, financial, and organizational data from being compromised. • Ensures Business Continuity: Helps prevent disruptions caused by security incidents, thereby maintaining the smooth operation of business processes. • Compliance: Helps organizations meet regulatory and legal requirements, avoiding fines and penalties. • Reputation Management: Protects an organization’s reputation by preventing data breaches and ensuring customer trust. Goals of Information Security: The CIA Triad 1. Confidentiality: o Ensures that information is accessible only to those who are authorized to access it. o Techniques include encryption, access controls, and authentication measures. 2. Integrity: o Ensures that information is accurate, complete, and protected from unauthorized modification. o Techniques include hashing, checksums, and version control. 3. Availability: o Ensures that information and resources are available to authorized users when needed. o Techniques include redundancy, failover mechanisms, and regular maintenance.
2.Threats and Vulnerabilities
Types of Threats: 1. Malware: o Malicious software designed to disrupt, damage, or gain unauthorized access to systems. o Examples: viruses, worms, Trojans, ransomware, spyware. 2. Phishing: o A technique used by attackers to trick individuals into divulging sensitive information, such as usernames, passwords, or credit card details, by posing as a trustworthy entity. o Common forms include emails, websites, and SMS messages that appear legitimate. 3. Social Engineering: o Manipulating individuals into performing actions or divulging confidential information. o Techniques include pretexting, baiting, and tailgating. Common Vulnerabilities and Exposures (CVEs): • Vulnerabilities are weaknesses or flaws in software, hardware, or processes that can be exploited by threats to gain unauthorized access or cause harm. • Exposures refer to configurations or settings that could potentially allow unauthorized access or compromise systems. • Common Vulnerabilities and Exposures (CVE): A publicly available database of known vulnerabilities in software and hardware that organizations can use to identify and address security risks. Risk Assessment and Management: • Risk Assessment: o The process of identifying, analyzing, and evaluating risks to an organization's information systems. o Includes identifying potential threats, assessing the impact and likelihood of those threats, and determining the level of risk. • Risk Management: o The process of implementing measures to reduce the risk to an acceptable level. o Involves risk mitigation (implementing controls to reduce risks), risk acceptance (acknowledging and accepting the risk), risk avoidance (eliminating the risk), and risk transfer (shifting the risk to a third party, such as through insurance).
Information Governance for Healthcare Professionals: A Practical Approach 1st Edition Robert F. Smallwood (Author) - The ebook with rich content is ready for you to download