+ All Categories
Transcript
Page 1: Course Tech 2013, Dr. Michael Moorman, Why Your Students Need a Course in Information Security

Why Your Students Need a Course in Information Security

Dr. Michael MoormanSaint Leo University

Page 2: Course Tech 2013, Dr. Michael Moorman, Why Your Students Need a Course in Information Security

Growth of Electronic Devices

• PCs• Laptops• Tablets• Pads• Smart phones

Page 3: Course Tech 2013, Dr. Michael Moorman, Why Your Students Need a Course in Information Security

Potential threats

• Malware– Viruses– Worms– Trojan horses– Spam

Page 4: Course Tech 2013, Dr. Michael Moorman, Why Your Students Need a Course in Information Security

Effects of threats

• Spread malware• DoS/DDoS• Be used as a bot• Identity theft

Page 5: Course Tech 2013, Dr. Michael Moorman, Why Your Students Need a Course in Information Security

Prevention

• Anti-virus software– Android/Windows– Apple

• Secure your device (loss/theft)– Pass code

• Knowledge

Page 6: Course Tech 2013, Dr. Michael Moorman, Why Your Students Need a Course in Information Security

Information security

• Key concepts• Balancing security and access

Page 7: Course Tech 2013, Dr. Michael Moorman, Why Your Students Need a Course in Information Security

The Book:

• Whitman, M.E. and Mattord, H. J. (2012). Principles of Information Security, 4th ed. Course Technology, Cengage Learning, Boston.

Page 8: Course Tech 2013, Dr. Michael Moorman, Why Your Students Need a Course in Information Security

Book Contents:• Introduction to Information Security• The Need for Security• Legal, Ethical, and Professional Issues in Information Security• Risk Management• Planning for Security• Security Technology: Firewalls and VPNs• Security Technology: Intrusion Detection and Prevention

Systems, and Other Security Tools• Cryptography• Physical Security• Implementing Information Security• Security and Personnel• Information Security Maintenance

Page 9: Course Tech 2013, Dr. Michael Moorman, Why Your Students Need a Course in Information Security

Employment in Information Security

• Jobs– CIO– CISO– Information Security Manager– Information Security Technician

Page 10: Course Tech 2013, Dr. Michael Moorman, Why Your Students Need a Course in Information Security

Credentials• International Information Systems Security Certification

Consortium (ISC)2

– Certified Information Systems Security Professional (CISSP)– Systems Security Certified Practitioner (SSCP)– Associate of (ISC)2 – Certification and Accreditation Professional (CAP)

• Information Systems Audit and Control Association (ISACA)– Certified Information Systems Auditor (CISA)– Certified Information Security Manager (CISM)

• SANS Global Information Assurance Certification (GIAC)• Security Certified Program (SCP)• CompTIA’s Security+ - one of the A+ series of professional tests

Page 11: Course Tech 2013, Dr. Michael Moorman, Why Your Students Need a Course in Information Security

Are there any questions?


Top Related