Uploaded by LAIBA

1---Introduction---Information-Security-19022024-124038pm

advertisement
1
2
The course is NOT about HOW TO HACK.
It is about HOW TO PROTECT INFORMATION.
3
4
5
6
7
8
9
10
11
12
13
https://alpinesecurity.com/blog/what-is-the-origin-of-the-word-cyber/
14
15
16
Figure 1-3 Components of Information Security
Principles of Information Security, Fourth Edition
18
19
© 2016 Pearson Education, Inc., Hoboken, NJ.
Owners
wish to
minimize
Threat agents
value
wish to abuse
and/or
may damage
impose
countermeasures
give
rise to
assets
to
reduce
risk
to
to
threats
that
increase
Figure 1.1 Security Concepts and Relationships
© 2016 Pearson Education, Inc., Hoboken, NJ.
22
Download