Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 1: INTRODUCTION TO SECURITY (Type of security threats…
CHAPTER 1:
INTRODUCTION TO SECURITY
Goals of security
•Integrity
•Availability
•Confidentiality
Type of security threats
•Unstructured
•Structured
•External
•Internal
Protecting physical equipment
Security hardware
a) Service packs
b) Security patches
Physicat protection
•important as data security
•using fences, door locks and gates.
•Protect cable
Definition
•Consists of provisions and policies adopted by the information system administration to prevent unauthorized acess of the computer network.
Type of attacks
a)Physicaly
•walk-in
•sneak-in
•break-in
•damage equipment
b) Data attack
•Access to data
•Data wiping
•Hard drive destruction
•Hard drive recycling
Purpose
Protect information
Physically
Emerging technologies
Firewall
Keeping the bad guys
Expectation
•user can perform only authorized task
•users can obtain only authorized information
•users cannot cause damage to the data
Protection Against
Malicious Software
•Software that brings harm to computer system form warms, viruses, Trojans, spyware, adware and emotions.
Signature file update
•short text file you create for use as a standard appendage at the end of your e-mail notes