Week2INFSYS3848.pdf INFSYS 3848
Popular in Principles of Information Security
Popular in Information technology
This 2 page Class Notes was uploaded by Andreas on Wednesday February 3, 2016. The Class Notes belongs to INFSYS 3848 at University of Missouri - St. Louis taught by Dr. Shaji Khan in Spring 2016. Since its upload, it has received 32 views. For similar materials see Principles of Information Security in Information technology at University of Missouri - St. Louis.
Reviews for Week2INFSYS3848.pdf
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 02/03/16
W What is security The quality of or state of being protected or safe from a harm or dangerWhen you have something value to protectmostly infomationsecurity was considered forever People act in deviant ways so security was a thing they always needed to control situations What is information Security The protection of information and info systems from unauthorized accessusedisclosure modification or destruction in order ro provide confidentiality integrity and availability Also note that information and info systems need not to be computer based So it is protection of information regardless of where is createdstored or destroyed What is lnfosec CA Confidentiality Integrity and Availability It is the core attributes of information Also fundamental principles of lnfoSec Confidentialitv Only those whose have the right and authoriazation to access info are able to do soThere is a breach in confidentiality when sb with no access tries to access info Integrity The property that data has not been altered in an unauthorized manner Availability Ensure timely and reliable access to and use of information Authenication Verifying the identity of user Attack An attemopt to gain unauthorized access to information or an attempt to compromise system integrity Control what we are doing Security mechanismspolicies that are designed to put in place attacks reduce risk and overall improve the security within an organization Threat anything capable of acting against an asset in a manner that can result in harm Risk probability of sth harmful to happen and the mpact of that bad happening Vulnerability weakness in an IS internal controlsystem security procedures that could be exploited Why are Info systems vulnerable Systems connected to a netwrok are vulnerableconnectivty exposes However even offline systems are at riskThere is no such thing such as 100 SECURITY Cyber crime 13 trillion to the global What are Information systems Combinations of hardware softwar and telecomunication netwroks that people build to collectcreate and distrubute useful data typically in an organization
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'