Ch1Introduction
Ch1Introduction
Ch1Introduction
MANAGEMENT
MIS534
Course Outline – Topics Covered
Protection Mechanism
Personnel and Security
Law and Ethics
Security and the Cloud
Classroom Procedures
Consists of:
Executive summary of the topic (~ 1500 words)
include an annotated bibliography (with at least 8
references)
15-20 minutes presentation of your executive summary
to class.
Hands On/Lab Presentation
Consists of:
Student Handout
Class Presentation
Live Demonstration
Annotated Bibliography of useful resources
Class Introductions/Expectations
Name
Background
Course Expectations
Who I am
Dr. Cummings
Assistant Professor at UNCW
Ph.D. in IS (Indiana University)
MBA in IS (Texas Tech University)
Industry experience in networking, programming, project
management.
Introduction to Information Security
Management
http://www.twincities.com/business/ci_24887125/target-
breach-likely-an-inside-job-data-security
http://www.computerweekly.com/news/2240212475/Tar
get-to-invest-5m-in-cyber-security-awareness
http://fortune.com/2014/12/30/new-research-sony-hack/
http://www.techrepublic.com/article/why-the-sony-hack-
shouldnt-lead-to-the-end-of-user-centric-it/
http://www.businessweek.com/articles/2014-11-06/home-depot-
hackers-got-in-via-a-vendor-took-53-million-e-mails-too
Technology is not enough…..
(From: PWC Global State of Information Security 2015)
Challenge:
Everything cannot be categorized as right or wrong
28
Key Information Security Concepts
29
Figure 1-1 Components of Information security
http://www.cnss.gov/policies.html
Source: Course Technology/Cengage Learning
CNSS Security Model (cont’d.)
C.I.A. triangle
– Confidentiality, integrity, and availability
– Has expanded into a more comprehensive list of
critical characteristics of information
Exp
a nd
incl ed to
ud e Identification
Authentication
Authorization
Privacy
Accountability
Confidentiality
Identification
– An information system possesses the characteristic of
identification when it is able to recognize individual users
– Identification and authentication are essential to
establishing the level of access or authorization that an
individual is granted
Authentication
– Occurs when a control proves that a user possesses the
identity that he or she claims
Authorization
Assures that the user has been specifically and
explicitly authorized by the proper authority to
access, update, or delete the contents of an
information asset
Security
Functionality Usability
Balancing Information Security and
Access
Impossible to obtain perfect security—it is a
process, not an absolute
http://csrc.nist.gov/publications/PubsTC.html
Planning
UNCW Policies
Programs
Measuring progress
• What is security?
• Principles of information security management
– Planning
– Policy
– Programs
– Protection
– People
– Project management
Next Class