Download presentation
Presentation is loading. Please wait.
1
Chapter 1 – Information Security Overview
EECS
2
We use the Internet everyday, to help us do things the quick way.
In order to tell the true from the false, we should install a good firewall. EECS
3
Asking for yeh but getting a nay, hackers will be kept at bay.
s that show a pretty doll, may be setting you up for a fall. EECS
4
Always remember to play it safe, so you won’t be led astray.
Be careful when you answer a strange call. Take it with a grain of salt. EECS
5
Instructor Contact David Chan can be reached at EECS
6
Information Security Objectives
Confidentiality (includes privacy) Integrity Availability EECS
7
Information Security Processes
Identification Authentication Authorization Logging Monitoring EECS
8
Common Security Techniques
Password Two-factor authentication Biometrics Access control lists for granting authorization to information Locks EECS
9
Common Security Techniques
Encryption Anti-virus Patching Firewall Intrusion detection system Intrusion prevention system EECS
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.