Lac 1 (Introduction To Information Security)
Lac 1 (Introduction To Information Security)
Data
Information
Unorganized
Organized
Data vs
Needs Processed Information Needs Processing
useful
Useless
Contextual Raw
In the 1960s.
The first program was
called ‘CREEPER’, created
by Bob Thomas.
What was the focus of
security during that time?
What did CREEPER do?
Computers became
The Rise of Firewalls in the 1990s
increasingly connected,
and computer viruses
evolved.
Snowden leaked
classified NSA
information, revealing
government
surveillance on the
public.
Hackers
compromised
Yahoo, affecting
three billion users,
leading to a $35
million fine and a
$350 million drop in
sale price.
What is security?
Security
Communication Security Operational Security
Disaster Recovery
Continuity Planning