Information Security Presentation

Information

Columbia Southern University

SECURITY

Discussion Outline

Goals of Information SecurityThree Sources of Information Security ThreatsTechnical SafeguardsData SafeguardsHuman SafeguardsAre Incident Response Teams Needed?

Goals of Information Security – Mobile Devices

Apply Appropriate Data, Technical, and Human SafeguardsRisk vs. Cost TradeoffsStopping ThreatsSecurity vs. FreedomEncrypting Devices for Better Protection

Kroenke, D. (2018). Using MIS (10th ed.). New York, NY: Pearson.

What are the Three Sources of Threats?

Human ErrorComputer CrimeNatural Events and Disasters

Kroenke, D. (2018). Using MIS (10th ed.). New York, NY: Pearson.

Types of Safeguards

Technical Safeguards

Identification and AuthorizationEncryptionFirewallsMalware ProtectionApplication Design

Kroenke, D. (2018). Using MIS (10th ed.). New York, NY: Pearson.

Data Safeguards

Data Rights and ResponsibilitiesPasswordsEncryptionBackup and RecoveryPhysical Security

Kroenke, D. (2018). Using MIS (10th ed.). New York, NY: Pearson.

Human Safeguards

HiringTrainingEducationProcedure DesignAdministrationAssessmentComplianceAccountability

Kroenke, D. (2018). Using MIS (10th ed.). New York, NY: Pearson.

Having an Incident Response Team

Handle Cybersecurity IncidentsMinimize the impact of the threats if they occurStrengthen the company defenses against future incidentsExperts in each fieldHuman ResourcesLegalCybersecurityManagement Team

Joseph, K.G. (2015). The Importance of Having an Effective Incident Response Team. SecirityIntelligence. Retrieved from https://securityintelligence.com/the-importance-of-having-an-effective- incident-response-team/

References

Joseph, K.G. (2015). The Importance of Having an Effective Incident Response Team. SecirityIntelligence. Retrieved from https://securityintelligence.com/the- importance-of-having-an-effective-incident-response-team/Kroenke, D. (2018). Using MIS (10th ed.). New York, NY: PearsonMabel, Meng, and Quana, (n.d.). Technical Safeguards. Google Sites. Retrieved from https://sites.google.com/site/ifsecurities/home/information-security- program/technical-safeguards

Place an Order

Plagiarism Free!

Scroll to Top