my pres @ red sea_university 23-12-2015

21
ومات ل ع م ل ا ة ي ن ق ت ل ة ي ي حد اهات ج ت ا. لة ل عا ف د مد ح ا( ن م ح ر ل حا ت ف ور ن ا د م س ف، ومات ل ع م ل ا( ن م ا( ح م ا رن ب< ب ساعد م اد ت س ا سات الدرا ة ي ل ك، ة ي ق ت< ن ط ت ل ا ة ي ل الدو( ح م را لب ا ة م د وح ة ي ق ت< ن ط ت ل ا ساء حN ، الإ ل ص ت ف ك ل م ل عا م ا ع، ح م ت ج م ل ا ة ودب ع س ل ا( ودان س ت ور ن ر، م ح ر الإa ح ب ل ا ة ع م ا ح23 a ر aaa بa مa س a تa د2015 [email protected]

Upload: anwar-fa-dafa-alla

Post on 16-Apr-2017

441 views

Category:

Education


5 download

TRANSCRIPT

Page 1: My Pres @ Red Sea_university 23-12-2015

لتقنية حديثة اتجاهاتالمعلومات

الله. دفع أحمد الرحمن فتح أنور دأمن ببرنامج مساعد استاذ

الدولية البرامج قسم المعلومات،الدراسات كلية ، التطبيقية

وخدمة التطبيقيةفيصل، الملك جامع المجتمع،

السعودية – بورتسودان اإلحساء األحمر، البحر جامعة2015ديسمبر 23

[email protected]

Page 2: My Pres @ Red Sea_university 23-12-2015

Background • Born & raised in Daim Shati, PortSudan <3 • Graduated from AASTMT – Alex-Egypt• Participated in the AOI2002, IOI2002 & Founded

SOI2003• Co-Founded SudaDev 2002• Founded TEDx in Sudan• Founded Sudanese Researchers Initiative• Co-founded OLPC-to-Sudan• Member, #Lift_US_Sanctions/ #TechSanctions

on Sudan• Founder #Nafeer_IT

Page 3: My Pres @ Red Sea_university 23-12-2015

• Challenges & Opportunities • U.S. Sanctions on Sudan• Entrepreneurship

Principals of Information Security, Fourth Edition 3

Page 4: My Pres @ Red Sea_university 23-12-2015

What’s HOT? • 3D Printing• Big Data Analytics • Internet of Things (IoT)• Digital Currency (BitCoin, etc…)• Social Networks (WHATSAPP,

FACEBOOK ,MESSENGER ,GOOGLE+ ,SKYPE,TWITTER, LINKEDIN, INSTAGRAM,PINTEREST , BADOO

• Digital Storytelling• Artificial Intelligence (Smarter

Machines) Self-driving cars, Drones, etc…

• Cyber Security (Cyber warfare)4

Page 5: My Pres @ Red Sea_university 23-12-2015
Page 6: My Pres @ Red Sea_university 23-12-2015
Page 7: My Pres @ Red Sea_university 23-12-2015
Page 8: My Pres @ Red Sea_university 23-12-2015

Information security

• Information security: a “well-informed sense of assurance that the information risks and controls are in balance.” — Jim Anderson, Inovant (2002)

• Security professionals must review the origins of this field to understand its impact on our understanding of information security today

Principles of Information Security, Fourth Edition 8

Page 9: My Pres @ Red Sea_university 23-12-2015

What is Security?

• “The quality or state of being secure—to be free from danger”

• A successful organization should have multiple layers of security in place: – Physical security– Personal security – Operations security – Communications security – Network security– Information security

9Principles of Information Security, Fourth Edition

Page 10: My Pres @ Red Sea_university 23-12-2015

What is Security? (cont’d.)

• The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information

• Necessary tools: policy, awareness, training, education, technology

• C.I.A. triangle– Was standard based on confidentiality, integrity, and

availability– Now expanded into list of critical characteristics of

information

Principles of Information Security, Fourth Edition 10

Page 11: My Pres @ Red Sea_university 23-12-2015

11Principles of Information Security, Fourth Edition

Figure 1-3 Components of Information Security

Page 12: My Pres @ Red Sea_university 23-12-2015

Key Information Security Concepts

• Access• Asset• Attack • Control, Safeguard, or

Countermeasure• Exploit• Exposure• Loss

12

• Protection Profile or Security Posture

• Risk• Subjects and Objects• Threat• Threat Agent • Vulnerability

Principles of Information Security, Fourth Edition

Page 13: My Pres @ Red Sea_university 23-12-2015

Key Information Security Concepts (cont’d.)

• Computer can be subject of an attack and/or the object of an attack– When the subject of an attack, computer is used as

an active tool to conduct attack– When the object of an attack, computer is the entity

being attacked

Principles of Information Security, Fourth Edition 13

Page 14: My Pres @ Red Sea_university 23-12-2015

Principles of Information Security, Fourth Edition 14

Figure 1-4 Information Security Terms

Page 15: My Pres @ Red Sea_university 23-12-2015

15

Figure 1-5 – Subject and Object of Attack

Principles of Information Security, Fourth Edition

Figure 1-5 Computer as the Subject and Object of an Attack

Page 16: My Pres @ Red Sea_university 23-12-2015

Critical Characteristics of Information

• The value of information comes from the characteristics it possesses: – Availability– Accuracy– Authenticity– Confidentiality– Integrity– Utility– Possession

Principles of Information Security, Fourth Edition 16

Page 17: My Pres @ Red Sea_university 23-12-2015

CNSS Security Model

Principles of Information Security, Fourth Edition 17

Figure 1-6 The McCumber Cube

Page 18: My Pres @ Red Sea_university 23-12-2015

Components of an Information System

• Information system (IS) is entire set of components necessary to use information as a resource in the organization – Software– Hardware– Data– People– Procedures– Networks

Principles of Information Security, Fourth Edition 18

Page 19: My Pres @ Red Sea_university 23-12-2015

Balancing Information Security and Access

• Impossible to obtain perfect security—it is a process, not an absolute

• Security should be considered balance between protection and availability

• To achieve balance, level of security must allow reasonable access, yet protect against threats

Principles of Information Security, Fourth Edition 19

Page 20: My Pres @ Red Sea_university 23-12-2015

20

Page 21: My Pres @ Red Sea_university 23-12-2015

Thank you

• Questions?

Principals of Information Security, Fourth Edition 21