Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 1 - Information Security Overview - Coggle Diagram
Chapter 1 - Information Security Overview
Defnition
Information security - InfoSec (prevents unauthorized access and to protect the confidentiality, integrity and availability of an information)
Needs of Information Security
Reduce unauthorized access - Do not allow access from other organizations without permissions
Determine where information security is needed - Identify which part is more important to provide security and provide the proper security to prevent from unauthorized access
Protects the data - Protects the data from get stolen or damaged by the third party
Enables the safe operation of applications - Applications runs in a secure mood
Prevent data breaches - Large amount of data become the main target of cyber criminals if the network is unprotected
Avoid account hijacking - Avoid phishing, fraud and software exploitations
Characteristics of Information Security
Confidentiality - Prevents unauthorized disclosure of systems and information
Example - Healthcare organization
Integrity - Prevents unauthorized modification of systems and information
Example - Bank organization
Availability - Prevents disruption of service and productivity
Example - Press Releases
Types of Security Models
Open Security Model
Great damage will occur when data breach happens
Easy to implement
Required simple password
Example - Hardware (router,switch)
Easy to configure and administrator
Easy for network users
Least Expensive
More to user friendly but lack of security
Suitable for LANs/public WANs that are not connected to the internet
Worst
Restrictive Security Model
Difficult to implement
Created by firewalls and identity servers
Suitable for LANs/ public WANs that are connected to the Internet
More difficult to configure and administer
More difficult for network users
More expensive
Balanced user friendly and security
Good
Closed Security Model
Most difficult to implement
All available security measures in this design
Protected assets are premium
User access is difficult and very complex
Most difficult to configure and administer
Most difficult for network users
Most expensive
High security but low on user friendly
Best