Chapter 1 - Introduction To Information Security

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

CHAPTER 1:

INTRODUCTION TO
INFORMATION SECURITY

KRISTIE CLEOPHAS GOROTUD


Jan 2021
CONTENT

 DEFINITION OF INFORMATION SYSTEMS


 COMPONENTS OF INFORMATION SYSTEMS
 WHAT IS INFORMATION SECURITY
 APPROACHES TO INFORMATION SECURITY
 IMPLEMENTATION
DEFINITION OF INFORMATION SYSTEM

an integrated set of components for collecting,


storing, and processing data and for
providing information, knowledge, and digital
product.
COMPONENTS OF INFORMATION
SYSTEMS
1) Hardware- a computer and its peripheral equipment: input, output, and storage
devices
 Computer
 Smartphone
 Tablets

2) Software- sets of instruction that tell the computer how to take data in, how to
process it, how to display information, and how to store data and information
 Two categories
a) system software –manage computer, data, program files
b) application software- handle specific tasks for user
3) Network- hardware and software that facilitate fast transmission and reception
of text, pictures, sound and animation in the form of electronic data
 E.g Local area network (LAN)

4) Data- input that the system takes to produce information


 E.g employee record
 Data stored in database

5) People- information system professionals and users who analyze organizational


information needs, design and construct information systems, write computer
programs, operate the hardware, and maintain software
 E.g database administrator, manager
WHAT IS INFORMATION SECURITY

Designed to protect the confidentiality,


integrity and availability (CIA) of
computer system data from those with
malicious intentions.
Confidentiality

 Information which is sensitive or confidential must remain so and be shared


only with appropriate users.
 For example, our confidential medical records should be released only to
those people or organizations authorized to see it.
 i.e. doctor, hospital, insurance, government agency, you.
Integrity

 Information must retain its integrity and not be altered from its original state.
 The records should be well protected so that no one can change the
information without authorization.
Availability

 Information and systems must be available to those who need it.


 The records should be available and accessible to authorized users
APPROACHES TO INFORMATION
SECURITY IMPLEMENTATION
Birokrasi

 Definisi :
 1 sistem pemerintahan yg
dijalankan oleh pegawai-
pegawai yg tidak dipilih oleh
rakyat.
 2 cara pemerintahan yg sangat-
sangat dikuasai oleh pegawai
kerajaan.
 3 cara pentadbiran yg banyak
melibatkan peringkat dan
peraturan.
Thank you
Tutorial

1. State 5 components of information system (5 marks)


2. What is the definition of Information Security? (3 marks)
3. Give two categories of software (2 marks)
4. Distinguish Top-down and Bottom-up approaches to Information Security
Implementation (10 marks)

You might also like