SlideShare a Scribd company logo
2
Most read
5
Most read
7
Most read
Principles of Information Security,
Fifth Edition
Chapter 2
The Need for Security
Lesson 1 - Introduction
Learning Objectives
• Upon completion of this material, you should be
able to:
– Discuss the organizational business need for information
security
Principles of Information Security, Fifth Edition 2
Introduction
• The primary mission of an information security
program is to ensure information assets—
information and the systems that house them—
remain safe and useful.
• If no threats existed, resources could be used
exclusively to improve systems that contain, use,
and transmit information.
• Threat of attacks on information systems is a
constant concern.
Principles of Information Security, Fifth Edition 3
Business Needs First
• Information security performs four important
functions for an organization:
– Protecting the organization’s ability to function
– Protecting the data and information the organization
collects and uses
– Enabling the safe operation of applications running
on the organization’s IT systems
– Safeguarding the organization’s technology assets
Principles of Information Security, Fifth Edition 4
Protecting the Functionality of an
Organization
• Management (general and IT) is responsible for
facilitating security program.
• Implementing information security has more to do
with management than technology.
• Communities of interest should address information
security in terms of business impact and cost of
business interruption.
Principles of Information Security, Fifth Edition 5
Protecting Data That Organizations
Collect and Use
• Without data, an organization loses its record of
transactions and ability to deliver value to
customers.
• Protecting data in transmission, in processing, and
at rest (storage) is a critical aspect of information
security.
Principles of Information Security, Fifth Edition 6
Enabling the Safe Operation of
Applications
• Organization needs environments that safeguard
applications using IT systems.
• Management must continue to oversee
infrastructure once in place—not relegate to IT
department.
Principles of Information Security, Fifth Edition 7
Safeguarding Technology Assets in
Organizations
• Organizations must employ secure infrastructure
hardware appropriate to the size and scope of the
enterprise.
• Additional security services may be needed as the
organization grows.
• More robust solutions should replace security
programs the organization has outgrown.
Principles of Information Security, Fifth Edition 8

More Related Content

PPT
Information Assurance And Security - Chapter 2 - Lesson 2
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 1 - Lesson 4
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 1 - Lesson 3
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 1 - Lesson 2
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 1 - Lesson 1
MLG College of Learning, Inc
 
PPT
Chapter 5 Planning for Security-students.ppt
Shruthi48
 
PPT
60304756 whitman-ch01-1
UDCNTT
 
Information Assurance And Security - Chapter 2 - Lesson 2
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 1 - Lesson 4
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 1 - Lesson 3
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 1 - Lesson 2
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 1 - Lesson 1
MLG College of Learning, Inc
 
Chapter 5 Planning for Security-students.ppt
Shruthi48
 
60304756 whitman-ch01-1
UDCNTT
 

What's hot (20)

PPT
Information Assurance And Security - Chapter 3 - Lesson 2
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 2 - Lesson 3
MLG College of Learning, Inc
 
PPT
Ethics in IT Security
mtvvvv
 
PDF
Information Security Lecture Notes
FellowBuddy.com
 
PPT
Ethics and information security 2
PT Bank Syariah Mandiri
 
PPT
Information Assurance And Security - Chapter 3 - Lesson 1
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 3 - Lesson 3
MLG College of Learning, Inc
 
PPTX
02 Legal, Ethical, and Professional Issues in Information Security
sappingtonkr
 
PPT
information security management
Gurpreetkaur838
 
PPTX
Information security
avinashbalakrishnan2
 
PPT
Chapter2 the need to security
Dhani Ahmad
 
PPT
Chapter 1 Presentation
Amy McMullin
 
PPT
Basics of Information System Security
chauhankapil
 
PPT
Introduction to information security
Kumawat Dharmpal
 
PPT
Computer Ethics
iallen
 
PPT
Security and information assurance
bdemchak
 
PDF
Chapter 11 laws and ethic information security
Syaiful Ahdan
 
PPTX
Ethics in computing
Lakshan Bamunusinghe
 
PPTX
Hacking and Types of Hacker.
Coder Tech
 
PPTX
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Sundas Kayani
 
Information Assurance And Security - Chapter 3 - Lesson 2
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 2 - Lesson 3
MLG College of Learning, Inc
 
Ethics in IT Security
mtvvvv
 
Information Security Lecture Notes
FellowBuddy.com
 
Ethics and information security 2
PT Bank Syariah Mandiri
 
Information Assurance And Security - Chapter 3 - Lesson 1
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 3 - Lesson 3
MLG College of Learning, Inc
 
02 Legal, Ethical, and Professional Issues in Information Security
sappingtonkr
 
information security management
Gurpreetkaur838
 
Information security
avinashbalakrishnan2
 
Chapter2 the need to security
Dhani Ahmad
 
Chapter 1 Presentation
Amy McMullin
 
Basics of Information System Security
chauhankapil
 
Introduction to information security
Kumawat Dharmpal
 
Computer Ethics
iallen
 
Security and information assurance
bdemchak
 
Chapter 11 laws and ethic information security
Syaiful Ahdan
 
Ethics in computing
Lakshan Bamunusinghe
 
Hacking and Types of Hacker.
Coder Tech
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Sundas Kayani
 
Ad

Similar to Information Assurance And Security - Chapter 2 - Lesson 1 (20)

PPTX
Chapter 2 - Lesson 2.pptx
JhaiJhai6
 
PPT
Lesson 1- Risk Managment
MLG College of Learning, Inc
 
PPTX
Chapter 3 - Lesson 2.pptx
JhaiJhai6
 
PPT
Lesson 2-Identify Theft
MLG College of Learning, Inc
 
PPT
Lesson 3- Major natural laws
MLG College of Learning, Inc
 
PPT
Lesson 1- Information Policy
MLG College of Learning, Inc
 
PPTX
Ch01_MoIS5e_v02.pptx business business business business
JawaherAlbaddawi
 
PPTX
Chapter 1 - Lesson 2.pptx
JhaiJhai6
 
PPT
Information security
Praveen Minz
 
PDF
Why Is Information Security So Important.docx.pdf
nextgenmarketing360
 
PPTX
SECURITY AND CONTROL
shinydey
 
PPTX
ISM-CS5750-01.pptx
RashidSahito1
 
Chapter 2 - Lesson 2.pptx
JhaiJhai6
 
Lesson 1- Risk Managment
MLG College of Learning, Inc
 
Chapter 3 - Lesson 2.pptx
JhaiJhai6
 
Lesson 2-Identify Theft
MLG College of Learning, Inc
 
Lesson 3- Major natural laws
MLG College of Learning, Inc
 
Lesson 1- Information Policy
MLG College of Learning, Inc
 
Ch01_MoIS5e_v02.pptx business business business business
JawaherAlbaddawi
 
Chapter 1 - Lesson 2.pptx
JhaiJhai6
 
Information security
Praveen Minz
 
Why Is Information Security So Important.docx.pdf
nextgenmarketing360
 
SECURITY AND CONTROL
shinydey
 
ISM-CS5750-01.pptx
RashidSahito1
 
Ad

More from MLG College of Learning, Inc (20)

PPTX
PC111.Lesson1
MLG College of Learning, Inc
 
PPTX
PC111-lesson1.pptx
MLG College of Learning, Inc
 
PPTX
PC LEESOON 6.pptx
MLG College of Learning, Inc
 
PPTX
PC 106 PPT-09.pptx
MLG College of Learning, Inc
 
PPTX
PC 106 PPT-07
MLG College of Learning, Inc
 
PPTX
PC 106 PPT-01
MLG College of Learning, Inc
 
PPTX
PC 106 Slide 04
MLG College of Learning, Inc
 
PPTX
PC 106 Slide no.02
MLG College of Learning, Inc
 
PPTX
pc-106-slide-3
MLG College of Learning, Inc
 
PPTX
PC 106 Slide 2
MLG College of Learning, Inc
 
PPTX
PC 106 Slide 1.pptx
MLG College of Learning, Inc
 
PDF
Db2 characteristics of db ms
MLG College of Learning, Inc
 
PDF
Db1 introduction
MLG College of Learning, Inc
 

Recently uploaded (20)

PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
Basics and rules of probability with real-life uses
ravatkaran694
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 

Information Assurance And Security - Chapter 2 - Lesson 1

  • 1. Principles of Information Security, Fifth Edition Chapter 2 The Need for Security Lesson 1 - Introduction
  • 2. Learning Objectives • Upon completion of this material, you should be able to: – Discuss the organizational business need for information security Principles of Information Security, Fifth Edition 2
  • 3. Introduction • The primary mission of an information security program is to ensure information assets— information and the systems that house them— remain safe and useful. • If no threats existed, resources could be used exclusively to improve systems that contain, use, and transmit information. • Threat of attacks on information systems is a constant concern. Principles of Information Security, Fifth Edition 3
  • 4. Business Needs First • Information security performs four important functions for an organization: – Protecting the organization’s ability to function – Protecting the data and information the organization collects and uses – Enabling the safe operation of applications running on the organization’s IT systems – Safeguarding the organization’s technology assets Principles of Information Security, Fifth Edition 4
  • 5. Protecting the Functionality of an Organization • Management (general and IT) is responsible for facilitating security program. • Implementing information security has more to do with management than technology. • Communities of interest should address information security in terms of business impact and cost of business interruption. Principles of Information Security, Fifth Edition 5
  • 6. Protecting Data That Organizations Collect and Use • Without data, an organization loses its record of transactions and ability to deliver value to customers. • Protecting data in transmission, in processing, and at rest (storage) is a critical aspect of information security. Principles of Information Security, Fifth Edition 6
  • 7. Enabling the Safe Operation of Applications • Organization needs environments that safeguard applications using IT systems. • Management must continue to oversee infrastructure once in place—not relegate to IT department. Principles of Information Security, Fifth Edition 7
  • 8. Safeguarding Technology Assets in Organizations • Organizations must employ secure infrastructure hardware appropriate to the size and scope of the enterprise. • Additional security services may be needed as the organization grows. • More robust solutions should replace security programs the organization has outgrown. Principles of Information Security, Fifth Edition 8