The Need for Security�Chapter 2
Our bad neighbor makes us early stirrers,
Which is both healthful and good husbandry.
-- William Shakespeare (1564–1616), King Henry, in Henry V, act 4, sc. 1, l. 6-7.
Learning Objectives:
Upon completion of this chapter you should be able to:
Principles of Information Security - Chapter 2
2
Business Needs First, �Technology Needs Last
Information security performs four important functions for an organization:
Principles of Information Security - Chapter 2
3
Protecting the Ability to Function
Principles of Information Security - Chapter 2
4
Enabling Safe Operation
Principles of Information Security - Chapter 2
5
Protecting Data
Principles of Information Security - Chapter 2
6
Safeguarding Technology Assets
Principles of Information Security - Chapter 2
7
Threats
Principles of Information Security - Chapter 2
8
Threats
Principles of Information Security - Chapter 2
9
Threats to Information Security
Principles of Information Security - Chapter 2
10
Acts of Human Error or Failure
Principles of Information Security - Chapter 2
11
Acts of Human Error or Failure
Principles of Information Security - Chapter 2
12
Principles of Information Security - Chapter 2
13
Deviations in Quality of Service by Service Providers
Principles of Information Security - Chapter 2
14
Internet Service Issues
Principles of Information Security - Chapter 2
15
Communications and Other Services
Principles of Information Security - Chapter 2
16
Power Irregularities
Voltage levels can increase, decrease, or cease:
Principles of Information Security - Chapter 2
17
Espionage/Trespass
Principles of Information Security - Chapter 2
18
Principles of Information Security - Chapter 2
19
Principles of Information Security - Chapter 2
20
Espionage/Trespass
Principles of Information Security - Chapter 2
21
Information Extortion
Principles of Information Security - Chapter 2
22
Sabotage or Vandalism
Principles of Information Security - Chapter 2
23
Deliberate Acts of Theft
Principles of Information Security - Chapter 2
24
Deliberate Software Attacks
Principles of Information Security - Chapter 2
25
Principles of Information Security - Chapter 2
26
Compromises to Intellectual Property
Principles of Information Security - Chapter 2
27
Compromises to Intellectual Property
Principles of Information Security - Chapter 2
28
Forces of Nature
Principles of Information Security - Chapter 2
29
Technical Hardware Failures or Errors
Principles of Information Security - Chapter 2
30
Technical Software Failures or Errors
Principles of Information Security - Chapter 2
31
Technological Obsolescence
Principles of Information Security - Chapter 2
32
Attacks
Principles of Information Security - Chapter 2
33
Malicious Code
Principles of Information Security - Chapter 2
34
Principles of Information Security - Chapter 2
35
Attack Descriptions
Principles of Information Security - Chapter 2
36
Attack Descriptions
Principles of Information Security - Chapter 2
37
Attack Descriptions
Principles of Information Security - Chapter 2
38
Attack Descriptions
Principles of Information Security - Chapter 2
39
Principles of Information Security - Chapter 2
40
Attack Descriptions
Principles of Information Security - Chapter 2
41
Principles of Information Security - Chapter 2
42
Principles of Information Security - Chapter 2
43
Attack Descriptions
Principles of Information Security - Chapter 2
44
Attack Descriptions
Principles of Information Security - Chapter 2
45
Attack Descriptions
Principles of Information Security - Chapter 2
46