Date post: | 14-Jan-2015 |
Category: |
Documents |
Upload: | cengage-learning |
View: | 122 times |
Download: | 0 times |
Why Your Students Need a Course in Information Security
Dr. Michael MoormanSaint Leo University
Growth of Electronic Devices
• PCs• Laptops• Tablets• Pads• Smart phones
Potential threats
• Malware– Viruses– Worms– Trojan horses– Spam
Effects of threats
• Spread malware• DoS/DDoS• Be used as a bot• Identity theft
Prevention
• Anti-virus software– Android/Windows– Apple
• Secure your device (loss/theft)– Pass code
• Knowledge
Information security
• Key concepts• Balancing security and access
The Book:
• Whitman, M.E. and Mattord, H. J. (2012). Principles of Information Security, 4th ed. Course Technology, Cengage Learning, Boston.
Book Contents:• Introduction to Information Security• The Need for Security• Legal, Ethical, and Professional Issues in Information Security• Risk Management• Planning for Security• Security Technology: Firewalls and VPNs• Security Technology: Intrusion Detection and Prevention
Systems, and Other Security Tools• Cryptography• Physical Security• Implementing Information Security• Security and Personnel• Information Security Maintenance
Employment in Information Security
• Jobs– CIO– CISO– Information Security Manager– Information Security Technician
Credentials• International Information Systems Security Certification
Consortium (ISC)2
– Certified Information Systems Security Professional (CISSP)– Systems Security Certified Practitioner (SSCP)– Associate of (ISC)2 – Certification and Accreditation Professional (CAP)
• Information Systems Audit and Control Association (ISACA)– Certified Information Systems Auditor (CISA)– Certified Information Security Manager (CISM)
• SANS Global Information Assurance Certification (GIAC)• Security Certified Program (SCP)• CompTIA’s Security+ - one of the A+ series of professional tests
Are there any questions?