Objectives: Basic Concept of IT Security Priorities Course Learning Outcomes: 1. Student will be able to understand Info
Posted: Sat Feb 19, 2022 3:21 pm
Objectives: Basic Concept of IT Security Priorities Course
Learning Outcomes: 1. Student will be able to understand
Information Risk Management Tools or Equipment Needed: 1. PC 2.
Internet explorer or chrome 3. Internet Theoretical Background: A
common definition of risk is an uncertain event that if it occurs,
can have a positive or negative effect on a project’s goals. The
potential for a risk to have a positive or negative effect is an
important concept. Why? Because it is natural to fall into the trap
of thinking that risks have inherently negative effects. If you are
also open to those risks that create positive opportunities, you
can make your project smarter, streamlined and more profitable.
Think of the adage –“Accept the inevitable and turn it to your
advantage.” That is what you do when you mine project risks to
create opportunities. Components of Information Security: 1.
Conduct Information Assurance (IA) refers to the steps involved in
protecting information systems, like computer systems and networks.
There are commonly five terms associated with the definition of
information assurance: Integrity Availability Authentication
Confidentiality Nonrepudiation IA is a field in and of itself. It
can be thought of as a specialty of Information Technology (IT),
because an IA specialist must have a thorough understanding of IT
and how information systems work and are interconnected. With all
of the threats that are now common in the IT world, such as
viruses, worms, phishing attacks, social engineering, identity
theft and more, a focus on protection against these threats is
required. IA is that focus. Lab Manual No. 1 | Page 3 Lab Exercise
2: You are working for a multi-national bank. As an IT Security
Specialist your task is to demonstrate effective IT Security
controls for the IT Infrastructure. Address systems, network,
applications and database. Prepare your IT Security documents a
below: 1) IT security as a set of cybersecurity strategies that
prevents unauthorized access to organizational assets such as
computers, networks, and data. Note: Define your organizations
strategy and your IT Infrastructure. 2) Maintain the integrity and
confidentiality of sensitive information, blocking the access of
sophisticated hackers. Note: Technical, Physical and Environmental
controls Rubric: Criteria for each Lab Exercise Marks
Learning Outcomes: 1. Student will be able to understand
Information Risk Management Tools or Equipment Needed: 1. PC 2.
Internet explorer or chrome 3. Internet Theoretical Background: A
common definition of risk is an uncertain event that if it occurs,
can have a positive or negative effect on a project’s goals. The
potential for a risk to have a positive or negative effect is an
important concept. Why? Because it is natural to fall into the trap
of thinking that risks have inherently negative effects. If you are
also open to those risks that create positive opportunities, you
can make your project smarter, streamlined and more profitable.
Think of the adage –“Accept the inevitable and turn it to your
advantage.” That is what you do when you mine project risks to
create opportunities. Components of Information Security: 1.
Conduct Information Assurance (IA) refers to the steps involved in
protecting information systems, like computer systems and networks.
There are commonly five terms associated with the definition of
information assurance: Integrity Availability Authentication
Confidentiality Nonrepudiation IA is a field in and of itself. It
can be thought of as a specialty of Information Technology (IT),
because an IA specialist must have a thorough understanding of IT
and how information systems work and are interconnected. With all
of the threats that are now common in the IT world, such as
viruses, worms, phishing attacks, social engineering, identity
theft and more, a focus on protection against these threats is
required. IA is that focus. Lab Manual No. 1 | Page 3 Lab Exercise
2: You are working for a multi-national bank. As an IT Security
Specialist your task is to demonstrate effective IT Security
controls for the IT Infrastructure. Address systems, network,
applications and database. Prepare your IT Security documents a
below: 1) IT security as a set of cybersecurity strategies that
prevents unauthorized access to organizational assets such as
computers, networks, and data. Note: Define your organizations
strategy and your IT Infrastructure. 2) Maintain the integrity and
confidentiality of sensitive information, blocking the access of
sophisticated hackers. Note: Technical, Physical and Environmental
controls Rubric: Criteria for each Lab Exercise Marks