Skip to main content

CS406: Information Security

Page path
  • Home /
  • Courses /
  • Course Catalog /
  • Computer Science /
  • CS406: Information Security /
  • Unit 1: Computer Security Concepts
Back to course 'CS406: Information Security'
  • Unit 1: Computer Security Concepts

    This unit provides an overview of information security. First, we look at the basic concepts of confidentiality, integrity, and availability as discussed in the National Institute of Standards and Technology (NIST) standard Federal Information Processing Standards (FIPS) 199. We will discuss threats, attacks, and assets in the overall context of a security management model. We will also learn about the challenges of information security and its overall scope.

    Completing this unit should take you approximately 6 hours.

    • Unit 1 Learning Outcomes Page
    • 1.1: Introduction to Information Security

      • The Open University: "An Introduction to Information Security" Page

        Read these sections, which introduce information security.

    • 1.2: Introduction to Data and Network Security

      • George Mason University: Paul A. Strassman's "Information Assurance for Defense Security" Page

        Watch this lecture to learn about the methods for managing risks to information assets. IT practitioners seek to protect the confidentiality, integrity, and availability of data and their delivery systems - whether the data are in storage, in processing, or in transit, and whether threatened by malice or accident.

    • 1.3: Confidentiality, Integrity, and Availability

      • University of Miami School of Medicine: "Confidentiality, Integrity, and Availability" >

        Read this page for an overview of the basic security concepts of confidentiality, integrity, and availability.

    • 1.4: NIST FIPS 199 Standard

      •  National Institute of Standards and Technology: "Standards for Security Categorization of Federal Information and Information Systems" File

        Read this document to gain a better understanding of the security objectives of confidentiality, integrity, and availability.

    • 1.5: Assets and Threats

      •  Robert J. Shimonski's "Threats and Your Assets: What Is Really at Risk?" URL

        Read this article for an introduction to the types of information assets and associated threats.

Navigation

Art History
Biology
Business Administration
Chemistry
Communication
Economics
English
History
Mathematics

Creative Commons License
© Saylor Academy 2010-2018 except as otherwise noted. Excluding course final exams, content authored by Saylor Academy is available under a Creative Commons Attribution 3.0 Unported license. Third-party materials are the copyright of their respective owners and shared under various licenses. See www.saylor.org/open/licensinginformation for detailed licensing information.

Saylor Academy and Saylor.org® are trade names of the Constitution Foundation, a 501(c)(3) organization through which our educational activities are conducted.

Terms of Use | Privacy Policy