Professional Documents
Culture Documents
Lec 03 Key Security Concepts
Lec 03 Key Security Concepts
Imtiaz Hussain
PhD Computer Science (Scholar)
Lecturer
Dept. of Computer Science
Key Information Security Concepts
Key Information Security Concepts
Confidentiality
Integrity
Availability
Authenticity
Accountability
Non Repudiation
Disruption
Misappropriation
Confidentiality
Early preparation
Identification
Containment
Eradication
Recovery
Future Preparation
Early preparation
The IRT works to isolate the areas that the breach took place to limit
the scope of the security event.
During this phase it is important to preserve information
forensically.
Containment could be as simple as physically containing a server
room or as complex as segmenting a network to not allow the spread
of a virus
Eradication
The threat that was identified is removed from the affected systems.
This could include using deleting malicious files, terminating
compromised accounts, or deleting other components.
This will help to ensure that the threat is completely removed
Recovery