01_introduction

Information Security
1 / 20
volgende
Slide 1: Woordweb
Information SecurityTertiary Education

In deze les zitten 20 slides, met interactieve quizzen en tekstslides.

time-iconLesduur is: 120 min

Onderdelen in deze les

Information Security

Slide 1 - Woordweb

Deze slide heeft geen instructies

What does cybersecurity primarily focus on?
A
Protecting networks and systems
B
User education and awareness
C
Data storage management
D
Maintaining physical security measures

Slide 2 - Quizvraag

Deze slide heeft geen instructies

Which is a key aspect of information security?
A
Network performance optimisation
B
Data confidentiality and integrity
C
Software development practices
D
User interface design

Slide 3 - Quizvraag

Deze slide heeft geen instructies

Cybersecurity is mainly concerned with which threat?
A
Employee misconduct
B
Natural disasters
C
Cyber attacks and breaches
D
Supply chain management

Slide 4 - Quizvraag

Deze slide heeft geen instructies

Information security ensures the protection of what?
A
Software applications
B
Physical office space
C
Employee productivity
D
Sensitive data and information

Slide 5 - Quizvraag

Deze slide heeft geen instructies

Cybersecurity vs Information Security
Information Security - covers all formats; Cybersecurity focuses on digital. 

Slide 6 - Tekstslide

Deze slide heeft geen instructies

CIA Triad
Confidentiality: Encryption, access control, social engineering awareness.
Integrity: Hashing, digital signatures, data validation.
Availability: Redundancy, fault tolerance, backup strategies.

Slide 7 - Tekstslide

Deze slide heeft geen instructies

Security Controls and Best Practices
Types: Administrative, Technical, Physical.

Control Types: Preventive, Detective, Corrective, Deterrent, Compensating.
Principles: Least privilege, separation of duties, defense-in-depth.
Security Controls and Best Practices

Slide 8 - Tekstslide

Deze slide heeft geen instructies

What is Security Framework? 
a structured set of guidelines, standards, and best practices that organizations use to:

Identify and manage security risks.
Protect critical information assets.
Ensure compliance with regulations.
Establish a strong security posture.

Slide 9 - Tekstslide

Deze slide heeft geen instructies

Why use security framework?

Slide 10 - Open vraag

Deze slide heeft geen instructies

Why use Security Framework?
Provide consistent practices across systems and teams.
Ensure regulatory and industry compliance.
Support risk-based decision-making.
Promote continuous security improvement.

Slide 11 - Tekstslide

Deze slide heeft geen instructies

Security Frameworks Overview
ISO/IEC 27001
NIST SP800-53
COBIT
PCI-DSS

CIS Top 20

Slide 12 - Tekstslide

Discuss how frameworks support governance and compliance. 
What can you understand about Security Framework ISO/IEC 27001?

Slide 13 - Open vraag

Deze slide heeft geen instructies

NIST SP 800-53

U.S.-based framework by the National Institute of Standards and Technology.
Provides a catalog of security and privacy controls.
Used heavily in government and federal systems.
Structured around the Risk Management Framework (RMF).

Slide 14 - Tekstslide

Deze slide heeft geen instructies

PCI-DSS (Payment Card Industry Data Security Standard)
Created by major credit card companies (Visa, MasterCard, etc.).
Applies to organizations handling cardholder data.
Focus areas:
Secure network and systems.
Protect cardholder data.
Vulnerability management.
Access control and monitoring.

Slide 15 - Tekstslide

Deze slide heeft geen instructies

COBIT (Control Objectives for Information and Related Technology)
Developed by ISACA.
Focuses on IT governance and management.
Aligns IT goals with business objectives.
Includes 4 domains: Plan, Build, Deliver, Monitor.

Slide 16 - Tekstslide

Deze slide heeft geen instructies

Slide 17 - Tekstslide

Deze slide heeft geen instructies

Risk Management Concepts
Define risk, threat, vulnerability, impact.
Introduce the risk formula:
Qualitative: Risk = Threat × Vulnerability.
Discuss exposure, countermeasures, and residual risk.

Slide 18 - Tekstslide

Deze slide heeft geen instructies

Risk Assessment and Mitigation Process
Steps in risk assessment:
1. Identify assets.
2. Identify threats and vulnerabilities.
3. Analyze risk.
4. Evaluate and prioritize.



Risk Responses: Accept, avoid, transfer, mitigate.

Slide 19 - Tekstslide

Deze slide heeft geen instructies

Information Security Governance and Leadership
Role of policies, leadership, and culture.

SOC (Security Operations Center) and incident response.

Cyber resilience planning and communication.

Slide 20 - Tekstslide

Deze slide heeft geen instructies