INFORMATION SECURITY GOAL

Developed and Presented By Dr. Mehrdad S SharbafCSUDHComputer Science Department

http://csc.csudh.edu/

The some of the materials are excerpted from Ian Sommerville’s Book, and Ross Anderson’s Book

http://www.csudh.edu/univadv/dateline/archives/20080725/facstaffnews/branding_03.jpg

INTRODUCTION TO INFORMATION SECURITY

INTRODUCTION TO INFORMATION SECURITY

SECURITY GOALS

SECURITY GOALS

SECURITY GOALS

COMPONENTS OF INFORMATION SECURITY

NSTISSC

NSTISSC SECURITY MODEL

THE THREAT ENVIRONMENT/COMPROMISES

THE THREAT ENVIRONMENT/COMPROMISES

THE THREAT ENVIRONMENT/COMPROMISES

THE THREAT ENVIRONMENT/COMPROMISES

THE THREAT ENVIRONMENT/COMPROMISES

THE THREAT ENVIRONMENT/COMPROMISES

THE THREAT ENVIRONMENT/COMPROMISES

THE THREAT ENVIRONMENT/COMPROMISES

THE THREAT ENVIRONMENT/COMPROMISES

THE THREAT ENVIRONMENT/COMPROMISES

COUNTERMEASURES

SECURITY TOOLS

SECURITY TOOLS

SECURITY TOOLS

SECURITY POLICY

SECURITY POLICY

Risk Identification

Security Policy Development

Compliance monitoring and evaluation

COMPLIANCE MONITORING AND EVALUATION

COMPLIANCE MONITORING AND EVALUATION

NIST-COMPUTER SECURITY RESOURCE CENTER

ISO 27000 SERIES

THE NEW PERSPECTIVE IN CYBER SECURITY