Friday, June 12, 2009

Saturday, Jun 13, 2009

Information Security

The goal of Information Security class is to give our student awareness of the existing serious threats of information security and knowledge of system vulnerabilities. The student will firstly be encouraged to; recognize the various threats; foresee its potential impact; scrutiny the vulnerabilities of the objects, and; learn how to cope with by examining the potential risk incorporated in the threats.

Link to class presentation files for Security Information (Jun 13 & 20 '09):

The Idea

Information security cannot be thought of as a single, discrete, entity; it's a whole range of measures, and should be viewed as a system. Information security is as complex as any other system which combines a number of different aspects and approaches, none of which can be regarded as more or less important. This means that no single aspect or approach can be disregarded; if one area or part of the system is ignored, the system will not function correctly.

Information security differs very little from security in general. After all, no one would install a heavy security door with a pick-proof lock on a garden shed. Similarly, a car can have excellent tires, but if the brakes are faulty, the car will be unsafe. Protection against cyber threats works on the same principle: all possible weak points should be secured, whether on a desktop computer, an organization's server or a corporate network. Data should also be accessed via secure paths.

No comments:

Post a Comment