0% found this document useful (0 votes)
85 views3 pages

Ias Quiz 1 Lesson 1

The document discusses key concepts in information security including definitions of security, information assurance, and information security. It outlines the history of computer security from early mainframes to the modern internet. The CIA triad of confidentiality, integrity and availability is introduced as fundamental security objectives. The document also discusses why information security is needed and the need to balance security with access.

Uploaded by

Iñakie Pulusan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views3 pages

Ias Quiz 1 Lesson 1

The document discusses key concepts in information security including definitions of security, information assurance, and information security. It outlines the history of computer security from early mainframes to the modern internet. The CIA triad of confidentiality, integrity and availability is introduced as fundamental security objectives. The document also discusses why information security is needed and the need to balance security with access.

Uploaded by

Iñakie Pulusan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

IAS QUIZ 1 LESSON 1-2 QUIZ

What is Security?

- “The quality or state of being secure – to be free from danger”


- To be protected from adversaries

Information Assurance (IA)

Digital Forensic and Cyber Security Center (DFCSC) defines IA as:

- Information assurance includes protection of the integrity, availability, authenticity, non-


repudiation, and confidentiality of user data.

Information Security (InfoSec)

- Practice of defending information from unauthorized access, use, disclosure, disruption,


modification, perusal, inspection, recording, or destruction.
- “well-informed sense of assurance that the information risks and controls are in balance” – Jim
Anderson, Inovant (2002)

History of Information Security

- Computer security began immediately after the first mainframes were developed
- Groups developing code-breaking computations during World War II created the first modern
computers
- Physical controls were needed to limit access to authorized personnel in sensitive military
locations
- Only rudimentary controls were available to defend against physical theft, espionage, and
sabotage

Study of Computer Security Begins

- Began with Rand Report R-609


- The scope of computer security grew from physical security to include
- Safety of the data
- Limiting unauthorized access to that data

The 1990s

- As networks of computers became more common, so did the need to interconnect the networks
- Result was the Internet, the first manifestation of a global network of networks
- In early Internet deployments, security was a low priority
The Present

- The Internet has brought millions of computer networks into communication with each other –
many of them unsecured
- Ability to secure each now influenced by the security on every computer to which it is
connected

Why do we need Information Security?

- The protection of information and its critical elements, including the systems and hardware that
use, store, and transmit that information
- The CIA triad embodies the three concepts of “fundamental security objects for both data,
information and computing services.”

The CIA Triad

Confidentiality

- Is about preventing the disclosure of data to unauthorized parties

Integrity

- Refers to protecting information from being modified by unauthorized parties

Availability

- Is making sure that authorized parties are able to access the information when needed

Critical Characteristics of Information

- The value of information comes from the characteristics it possesses.


- Availability
- Accuracy
- Authenticity
- Confidentiality
- Integrity
- Utility
- Possession

Balancing Security and Access

- Impossible to obtain perfect security – security is not absolute; it is a process


- Security should be a balance between protection and availability
- To achieve balance, the level of security must allow reasonable access, yet protect against
threats

Balancing Security and Access

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy