Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Summary

Summary Bachelor of Science in Information Technology (BSIT)

Rating
-
Sold
-
Pages
9
Uploaded on
21-04-2022
Written in
2021/2022

Summary of Foundations of Information Security

Institution
Course

Content preview

FOUNDATIONS OF INFORMATION SECURITY
(Summary/Reviewer)
Defining Information Security
Generally speaking, security means protecting your assets, whether from attackers invading your
networks, natural disasters, vandalism, loss, or misuse. Ultimately, you’ll attempt to secure yourself
against the most likely forms of attack, to the best extent you reasonably can, given your environment.

Information security is defined as “protecting information and information systems from
unauthorized access, use, disclosure, disruption, modification, or destruction,” according to US law. 1 In
other words, you want to protect your data and systems from those who seek to misuse them,
intentionally or unintentionally, or those who should not have access to them at all.

When Are You Secure?

“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in
a lead-lined room with armed guards—and even then, I have my doubts.” 2 A system in such a state
might be secure, but it’s not usable or productive. As you increase the level of security, you usually
decrease the level of productivity.

In some environments, however, such security measures might not be enough. In any
environment where you plan to put heightened levels of security in place, you also need to consider the
cost of replacing your assets if you happen to lose them and make sure you establish reasonable levels
of protection for their value.

Defining the exact point at which you can be considered secure presents a bit of a challenge. Are
you secure if your systems are properly patched? Are you secure if you use strong passwords? Are you
secure if you’re disconnected from the internet entirely? From my point of view, the answer to all these
questions is no. No single activity or action will make you secure in every situation. That’s because even
if your systems are properly patched, there will always be new attacks to which you’re vulnerable. When
you’re using strong passwords, an attacker will exploit a different avenue instead. When you’re
disconnected from the internet, an attacker could still physically access or steal your systems. In short,
it’s difficult to define when you’re truly secure


The Information Security Triad: Confidentiality, Integrity, Availability
(CIA)

Confidentiality

When protecting information, we want to be able to restrict access to those who are allowed to
see it; everyone else should be disallowed from learning anything about its contents. This is the
essence of confidentiality. For example, federal law requires that universities restrict access to

This is taken from the lesson and has been summarized to review important terms/notes about
Information Security.

#Institute of Information Technology

, private student information. The university must be sure that only those who are authorized have
access to view the grade records.

Integrity

Integrity is the assurance that the information being accessed has not been altered and truly
represents what is intended. Just as a person with integrity means what he or she says and can be
trusted to consistently represent the truth, information integrity means information truly
represents its intended meaning. Information can lose its integrity through malicious intent, such
as when someone who is not authorized makes a change to intentionally misrepresent something.
An example of this would be when a hacker is hired to go into the university’s system and
change a grade.

Integrity can also be lost unintentionally, such as when a computer power surge corrupts a file or
someone authorized to make a change accidentally deletes a file or enters incorrect information.



Availability

Information availability is the third part of the CIA triad. Availability means that information can
be accessed and modified by anyone authorized to do so in an appropriate timeframe. Depending
on the type of information, appropriate timeframe can mean different things. For example, a
stock trader needs information to be available immediately, while a sales person may be happy to
get sales numbers for the day in a report the next morning. Companies such as Amazon.com will
require their servers to be available twenty-four hours a day, seven days a week. Other
companies may not suffer if their web servers are down for a few minutes once in a while.


Introduction to Physical Security

Most people think about locks, bars, alarms, and uniformed guards when they think about security. While
these countermeasures are by no means the only precautions that need to be considered when trying to
secure an information system, they are a perfectly logical place to begin. Physical security is a vital part
of any security plan and is fundamental to all security efforts--without it, information security (Chapter 6),
software security (Chapter 7), user access security (Chapter 8), and network security (Chapter 9) are
considerably more difficult, if not impossible, to initiate. Physical security refers to the protection of
building sites and equipment (and all information and software contained therein) from theft, vandalism,
natural disaster, manmade catastrophes, and accidental damage (e.g., from electrical surges, extreme
temperatures, and spilled coffee). It requires solid building construction, suitable emergency
preparedness, reliable power supplies, adequate climate control, and appropriate protection from
intruders.


Concepts of Information Security
This is taken from the lesson and has been summarized to review important terms/notes about
Information Security.

#Institute of Information Technology

Written for

Institution
Course

Document information

Uploaded on
April 21, 2022
Number of pages
9
Written in
2021/2022
Type
SUMMARY

Subjects

$5.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
cristysolacito

Also available in package deal

Get to know the seller

Seller avatar
cristysolacito Partido State University
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
5 year
Number of followers
0
Documents
7
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions