Page 13 - PowerPoint Presentation
P. 13

Chapter 1

                       SECURITY AND RISK MANAGEMENT (Part 1)


               Learning Objectives

               After the completion of the chapter, students will be able to:
                   1.  elaborate the CIA triad elements of confidentiality, integrity, and availability.
                   2.  explain how identification works.
                   3.  discuss the process of authentication.
                   4.  explain how authorization fits into a security plan.
                   5.  explain the auditing process.
                   6.  discuss the importance of accountability.
                   7.  identify key security roles.
                   8.  explain how layering simplifies security
                   9.  explain the concept of abstraction, data hiding, and the need for encryption
                   10. discuss why and how data is classified.


                         Security Governance Through Principles and Policies

                   A.  Understand and Apply Concepts of Confidentiality, Integrity, and Availability


                       Confidentiality, integrity, and availability (CIA) are usually present in the list of the most
                   important security principles because these are typically viewed as the primary goals and
                   objectives of a security infrastructure. They are so commonly seen as security essentials
                   that they are referenced by the term CIA Triad. Overall, a complete security solution should
                   adequately  address  each  of  these.  Thus,  it  is  a  good  idea  to  be  familiar  with  these
                   principles and use them as guidelines for judging all things related to security. However
                   important each specific principle is to a specific organization depends on the organization’s
                   security goals and requirements and on the extent to which the organization’s security
                   might be threatened.


                                              Confidentiality















                        Integrity                                             Availability


                                                       Figure 1. CIA Triad


                       1.  Confidentiality
               ITEC106 – Systems Security                                       Mr. John Mark L. Dula
   8   9   10   11   12   13   14   15   16   17   18