Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham

Slides:



Advertisements
Similar presentations
CISSP Seeks CIPP Object: Mutual Compliance Marriage of Privacy and Security Professionals Under HIPAA David B. Nelson, CISSP Yolo County Woodland, California.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Dr. Bhavani Thuraisingham Introduction to Information Systems Security Lecture #1 May 27, 2011.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Security Controls – What Works
Chapter 1 – Introduction
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Security+ Guide to Network Security Fundamentals
Building a Successful Security Infrastructure
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
IS Network and Telecommunications Risks
IS 380 OME 1 Fall 2010 Class 1. Administrative Roster Syllabus Review Class overview 10 domains overview.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
SEC835 Database and Web application security Information Security Architecture.
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
Information Security Update CTC 18 March 2015 Julianne Tolson.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
Cryptography and Network Security
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
CSCE 727 Information Warfare
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Information Security Analytics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Dr. Bhavani Thuraisingham Information Security and Risk Management June 5, 2015 Lecture #5 Summary of Chapter 3.
Information Security tools for records managers Frank Rankin.
Information Management System Ali Saeed Khan 29 th April, 2016.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Dr. Bhavani Thuraisingham Analyzing and Securing Social Networks Introduction to Major Modules in Cyber Security Lecture #2 January 18, 2013.
CS457 Introduction to Information Security Systems
Information Security.
Data and Applications Security
Information Systems Security Dr. Bhavani Thuraisingham
Computer and Network Security
IS4680 Security Auditing for Compliance
IS4680 Security Auditing for Compliance
How to Mitigate the Consequences What are the Countermeasures?
Cybersecurity Threat Assessment
Data and Applications Security
Data and Applications Security
Cryptography and Network Security
Data and Applications Security
Presentation transcript:

Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham Cyber Security Lecture for June 25, 2010 Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham

Outline What is Cyber Security? What is C. I. A.? Ten Major Modules of Cyber Security Topics for June 25, 2010 Introduction to Cyber Security Information Security and Risk Management

Cyber Security Security traditionally has been about CIA (Confidentiality, Integrity, Availability) Security now also includes areas like Trustworthiness, Quality, Privacy Dependability includes Security, Reliability and Fault Tolerance Initially the term used was Computer Security (Compusec); it then evolved into Infosec – Information security – to include data and networks – now with web its called Cyber Security

C. I.A. Confidentiality: Preventing from unauthorized disclosure Integrity: Preventing from unauthorized modification Availability: Preventing denial of service

Ten Major Modules of Cyber Security Information Security and Risk Management Access Control Security Architecture and Design Physical and Environmental Security Telecommunications Security Cryptography Business Continuity Planning Legal Regulations, Compliance and Investigations Applications Security Operations Security

Information Security and Risk Management Security Management Security Administration Organizational Security Model Information Risk Management Risk Analysis Policies, Standards, Guidelines, Procedures Information Classification Layers of Responsibility Security Awareness Training

Access Control Security Principles Identification, Authentication, Authorization, Accountability Access Control Models Access Control techniques Access Control Administration Access Control Methods Access Control Types Accountability Access Control practices Access Control Monitoring Threats to Access Control

Security Architecture and Design Computer Architecture Systems Architecture Security Models Security Modes of Operation Systems Evaluation Methods Open vs. Closed Systems Enterprise Architecture Security Threats

Physical and Environmental Security What is Physical Security Planning Process Protecting assets Internal Support Systems Perimeter Security Other aspects

Telecommunications and Network Security Open Systems Interconnection Reference Model TCP/IP Types of Transmission LAN Networking Routing Protocols Networking Devices Networking services and protocols Intranets and Extranets Metropolitan Area networks Remote access Wireless technologies Rootkits

Cryptography History, Definitions and Concepts Types of Ciphers Methods of Encryption Type of Asymmetric Systems Message Integrity PKI Key Management Link / End-to-end Encryption Email standards Internet security Attacks

Legal Regulation and Compliance Investigation Cyber law and Cyber crime Intellectual property law Privacy Liability and Ramifications Digital Forensics and Investigations Ethics

Applications Security Software and applications security issues Database Security Secu4e systems development Application development and security Object-oriented systems and security Distributed computing and security Expert systems and security Web security Mobile code Patch management

Operations Security Role of the Operations Department Administrative Management Assurance Levels Configuration management Media Controls Data Leakage Network and Resource Availability Mainframes Email Security Vulnerability testing