1 2 The course is NOT about HOW TO HACK. It is about HOW TO PROTECT INFORMATION. 3 4 5 6 7 8 9 10 11 12 13 https://alpinesecurity.com/blog/what-is-the-origin-of-the-word-cyber/ 14 15 16 Figure 1-3 Components of Information Security Principles of Information Security, Fourth Edition 18 19 © 2016 Pearson Education, Inc., Hoboken, NJ. Owners wish to minimize Threat agents value wish to abuse and/or may damage impose countermeasures give rise to assets to reduce risk to to threats that increase Figure 1.1 Security Concepts and Relationships © 2016 Pearson Education, Inc., Hoboken, NJ. 22