Preview

NT2580

Satisfactory Essays
Open Document
Open Document
1232 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2580
NT2580 Introduction to
Information Security
Unit 1
Information Systems Security
Fundamentals
© ITT Educational Services, Inc. All rights reserved.

Learning Objective
Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. NT2580 Introduction to Information Security

© ITT Educational Services, Inc. All rights reserved.
Page 2

Key Concepts
 Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure
 Common threats for each of the seven domains
 IT security policy framework
 Impact of data classification standard on the seven domains

NT2580 Introduction to Information Security

© ITT Educational Services, Inc. All rights reserved.
Page 3

EXPLORE: CONCEPTS

NT2580 Introduction to Information Security

© ITT Educational Services, Inc. All rights reserved.
Page 4

Introducing ISS

ISS
Information
Systems
Information

NT2580 Introduction to Information Security

© ITT Educational Services, Inc. All rights reserved.
Page 5

In t

fid en tia l ity

The CIA Triad

Co n y rit eg

Availability

NT2580 Introduction to Information Security

© ITT Educational Services, Inc. All rights reserved.
Page 6

Confidentiality
Personal Data and Information
• Credit card account numbers and bank account numbers
• Social Security numbers and address information

Intellectual Property
• Copyrights, patents, and secret formulas
• Source code, customer databases, and technical specifications

National Security
• Military intelligence
• Homeland security and government-related information
NT2580 Introduction to Information Security

© ITT Educational Services, Inc. All rights reserved.
Page 7

Integrity
Maintain valid, uncorrupted, and accurate information.  User names and passwords
 Patents and copyrights
 Source code
 Diplomatic information
 Financial data

NT2580 Introduction to Information Security

© ITT Educational Services, Inc.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 5

    • 800 Words
    • 4 Pages

    1. Is an external wall within 900mm of an allotment boundary to another property, 1.8m to another building that isn’t a class 10 building, or 3m from a brush fence?…

    • 800 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2670 Lab 5

    • 88 Words
    • 1 Page

    2. No you need to configure the URL and path for the media you want to show.…

    • 88 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4

    • 694 Words
    • 3 Pages

    Records are maintained for each product which includes product specifications, formulation, label, and special manufacturing instructions.…

    • 694 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt2580 Unit 2 Lab 1

    • 581 Words
    • 3 Pages

    With Google, it’s a little more complicated. There didn't used to be a single locker but now the Big G has taken care of that one with the launch of the Google Drive. You get 5GB of space plus 1GB of Picasa storage for free along with any space in your Docs and Gmail section. There's an apparent maximum storage space on the Google Drive itself up to 100GB but you can rent more space from…

    • 581 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

     Importance • Significant amount of supplemental information IS4799 Information Systems and Cybersecurity Capstone Project © ITT Educational Services, Inc. All rights reserved. Page 4 Key Concepts  Clarification • Additional information to clarify RFP contents…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    It250

    • 272 Words
    • 2 Pages

    Which of the following symbols instructs the shell to redirect the output of a command to the specified file instead of the screen and overwrite the file?…

    • 272 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays