Principals of Information Securi
x x x
ty
The Need for Security
x x x
, Learning Objectives x
• Upon completion of this material, you should be ab
x x x x x x x x
le to:
x
– Demonstrate that organizations have a business n
x x x x x x
eed for information security
x x x
– Explain why a successful information security p
x x x x x x
rogram is the responsibility of both an organizati
x x x x x x x
on’s general management and IT management
x x x x x
2
, Learning Objectives (cont’d.) x x
– Identify the threats posed to information security and th
x x x x x x x x
e more common attacks associated with those threats,
x x x x x x x x
and differentiate threats to the information within syste
x x x x x x x
ms from attacks against the information within systems
x x x x x x x
– Describe the issues facing software developers, as w
x x x x x x x
ell as the most common errors made by developers, a
x x x x x x x x x
nd explain how software development programs can c
x x x x x x x
reate software that is more secure and reliable
x x x x x x x
3
, Introduction
• Primary mission of information security is to ensure sy
x x x x x x x x
stems and contents stay the same
x x x x x
• If no threats existed, resources could be focused on
x x x x x x x x
improving systems, resulting in vast improvement
x x x x x x
s in ease of use and usefulness
x x x x x x
• Attacks on information systems are a daily o
x x x x x x x
ccurrence
4
x x x
ty
The Need for Security
x x x
, Learning Objectives x
• Upon completion of this material, you should be ab
x x x x x x x x
le to:
x
– Demonstrate that organizations have a business n
x x x x x x
eed for information security
x x x
– Explain why a successful information security p
x x x x x x
rogram is the responsibility of both an organizati
x x x x x x x
on’s general management and IT management
x x x x x
2
, Learning Objectives (cont’d.) x x
– Identify the threats posed to information security and th
x x x x x x x x
e more common attacks associated with those threats,
x x x x x x x x
and differentiate threats to the information within syste
x x x x x x x
ms from attacks against the information within systems
x x x x x x x
– Describe the issues facing software developers, as w
x x x x x x x
ell as the most common errors made by developers, a
x x x x x x x x x
nd explain how software development programs can c
x x x x x x x
reate software that is more secure and reliable
x x x x x x x
3
, Introduction
• Primary mission of information security is to ensure sy
x x x x x x x x
stems and contents stay the same
x x x x x
• If no threats existed, resources could be focused on
x x x x x x x x
improving systems, resulting in vast improvement
x x x x x x
s in ease of use and usefulness
x x x x x x
• Attacks on information systems are a daily o
x x x x x x x
ccurrence
4