1.02k likes | 1.12k Vues
Explore the history and background of information security, covering topics such as batch processing, remote access, RACF, Orange Book, Common Criteria, and more. Learn why information security is vital and how it impacts commercial image and reputation. Delve into security requirements, risk assessment, threat analysis, legal requirements, and good practices. Participate in exercises like identifying serious threats and utilizing risk models. Stay informed on the top IT-security threats to organizations.
E N D
Data SecurityE2002, Lecture 1 August 30, 2002 000-015 History Background - Batch - Remote access, DB, RACF - Orange Book - ITSec, Common Criteria - Code of Practice - BS 7799, ISO 17799 - ISO TR 13335 - DS 484
015-030 What is Information Security ? Why do we need Information Security ? - Commercial Image - Loss of Reputation, Trust, Confidence Examples
030-090 Security Requirements - Risk Assessment ¤ Exercise: Five most serious threats ¤ KPMG Security Survey ¤ Traffic Light Analysis ¤ Risk Model ¤ Vulnerability Analysis Threats – BSI List - Legal Requirements ¤ FSR Vejl. 14 + 17 ¤ SysTrust - Good Practice
Exercise Which are the five most serious IT-security threats to an organization ?