Chapter 1 - Introduction To Information Security
Chapter 1 - Introduction To Information Security
Chapter 1 - Introduction To Information Security
Information Security (InfoSec): The practice of protecting information from unauthorized access,
disclosure, alteration, and destruction.
Compliance and Legal Standards: Adherence to laws and regulations (e.g., GDPR, HIPAA, SOX).
Risk Management: Reduces potential damages from cyber threats and data breaches, including
financial losses, reputational damage, and operational disruption.
Physical Security: Protecting physical assets and data storage locations from unauthorized
access.
Cloud Security: Protecting data and resources hosted in the cloud environment.
Endpoint Security: Securing end-user devices like computers, phones, and tablets.
Data Security: Ensuring sensitive data is protected through encryption, access controls, and
masking.
Malware: Malicious software like viruses, worms, trojans, ransomware, and spyware that can
damage or disrupt systems.
Phishing: Deceptive tactics to trick individuals into providing personal or sensitive information.
Insider Threats: Risks posed by employees or trusted individuals within an organization who
misuse access.
Risk: The potential for loss or damage when a vulnerability is exploited by a threat.
Common Vulnerabilities:
o Unpatched software
o Weak passwords
o Lack of encryption
Authentication: Verifying the identity of a user, device, or system (e.g., passwords, biometrics).
Accountability: Tracking user activities and ensuring compliance with security policies.
Non-Repudiation: Ensuring that a person or entity cannot deny the authenticity of their actions
or communications.
Security Policy: A high-level document outlining an organization's security principles, goals, and
rules.
Guidelines: Recommendations that support standards and policies for achieving security.
Types of Policies:
o Incident Response Policy: Outlines the steps to follow in case of a security breach.
Chief Information Security Officer (CISO): Senior executive responsible for the organization’s
information security strategy.
Regular Software Updates: Ensures vulnerabilities in software and applications are patched.
Backup and Disaster Recovery: Ensures data recovery in case of accidental loss or attack.