1 / 12

IT Vocab

IT Vocab. IT = information technology Server Public – open access Private – limited access Client or host Thin - diskless Workstation – fully functioning computer system. IT Vocab. A computing system : a configuration of one or more computers along with the software and data. IT Vocab.

Download Presentation

IT Vocab

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IT Vocab • IT = information technology • Server • Public – open access • Private – limited access • Client or host • Thin - diskless • Workstation – fully functioning computer system

  2. IT Vocab • A computing system : a configuration of one or more computers along with the software and data.

  3. IT Vocab • Subject – a person or process • Object – assets like data, applications, documentation, hardware.

  4. Tenets of IT Security CS5493

  5. A I C • Availability – assets are available in a timeframe where it matters. • Integrity – assets remain in their legitimate expected state. • Confidentiality - assets are accessed only by authorized subjects.

  6. What are assets? • An asset is something of value: • Hardware • Software • Data • Employees • Equipment • Reputation • Infrastructure

  7. AIC and Threat Categories • Denial or destruction threats • Alteration threats • Improper disclosure threats

  8. The Domains of IT Infrastructure • User domain • Workstation domain • LAN domain • LAN-to-WAN domain • WAN domain • Remote Access domain • Server (System)/Application domain

  9. Domain Breakdown • The IT infrastructure is broken into different domains so security policy can be organized effectively.

  10. IT Domain Security Policy • A comprehensive security plan can be devised by considering each separate domain. • Identify the threats and vulnerabilities • Devise a strategy for eliminating the vulnerabilities.

  11. Vulnerabilities Examples: • User – lack of awareness or concern for security policy. • Workstation domain – unauthorized access • LAN – spreading of malicious software • WAN – malicious attacks by anonymous sources • Remote access – Data leakage due to loss or theft of electronic devise • Server/App – Data loss due to software and hardware failures.

  12. Domain Threat Targets • User – misuse of resources, social engineering • Workstation – OS, applications • LAN – hubs, cables, supporting software, etc. • WAN – routers, firewalls, supporting software, etc. • Remote Access – VPN • Server Application – e-mail, file services, database, etc.

More Related