正在加载图片...
CHAPTER 1 What is Information Security? Information in This Chapter: ssing Security Issues Attacks ■Defense in Depth INTRODUCTION Information security is a concept that becomes ever more enmeshed in many aspects of our society,largely as a result of our nearly ubiquitous adoption of computing technology.In our everyday lives,many of us work with computers for our employers,play on computers at home,go to school online,buy goods rom merchants on the Internet,take our lap aa asn pue sdrosp arry our smartph nk Although this technology enables us to be more productive and allows us to access a host of information with only a click of the mouse,it also carries with it a host of security issues.If the information on the systems used by our employers or our banks becomes exposed to an attacker,the consequences can be dire indeed.We could suddenly find ourselves bereft of funds,as the con- iddle of the night.Our could lose lega osecution,a suffer damage toits reputation because of a system configu ration issue al ing an attacker to gain access to a database containing per sonally identifiable information(Pll)or proprietary information.We see such issues appear in the media with disturbing regularity. If we look back 30 years,such issues related to computer systems were nearly nonexistent largely due to the low level of technology were using what was in place.Although technology chan 1 Introduction Information security is a concept that becomes ever more enmeshed in many aspects of our society, largely as a result of our nearly ubiquitous adoption of computing technology. In our everyday lives, many of us work with computers for our employers, play on computers at home, go to school online, buy goods from merchants on the Internet, take our laptops to the coffee shop and check our e-mail, carry our smartphones on our hips and use them to check our bank balances, track our exercise with sensors in our shoes, and so on, ad infinitum. Although this technology enables us to be more productive and allows us to access a host of information with only a click of the mouse, it also carries with it a host of security issues. If the information on the systems used by our employers or our banks becomes exposed to an attacker, the consequences can be dire indeed. We could suddenly find ourselves bereft of funds, as the con￾tents of our bank account are transferred to a bank in another country in the middle of the night. Our employer could lose millions of dollars, face legal prosecution, and suffer damage to its reputation because of a system configu￾ration issue allowing an attacker to gain access to a database containing per￾sonally identifiable information (PII) or proprietary information. We see such issues appear in the media with disturbing regularity. If we look back 30 years, such issues related to computer systems were nearly nonexistent, largely due to the low level of technology and the few people who were using what was in place. Although technology changes at an increasingly What is Information Security? CHAPTER 1 Information in This Chapter: ■ What is Security? ■ Models for Discussing Security Issues ■ Attacks ■ Defense in Depth
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有