Data Protection and Security

   

I

Introduction to Information Security

   

I.V

Summary

   

   
 

In this introductory chapter, we first gave the definitions of main security concepts. After briefly mentioning the reasons of difficulty we face in information security, we listed the common security targets.

We also introduced you the topics of security management, security policies and risk management. We end up this chapter by providing a list of general security principles. In the next chapter we start explaining “cryptography”, a fundamental tool for security systems.

 

 


   

I.L

External Links

   

   
 

To take a peak at the state-of-the-art technologies in Information Security, you can visit Information Security form [here].

MIT has an OCW page for Network and Computer Security course, which also includes an introduction to Information Security that can be found [here].

Review IEEE's interest in Information Security matters at Symposium on Security and Privacy pages at [here].

For a list of related courses to this course, you can review [this] page.

 

 


   
       
       
 
«previous session [1]  
   
       
 
«return to previous section  
  concepts »