Fundamentals of Information Security
()
About this ebook
This is a practical guide will help you build a successful career in Information Security.
Related to Fundamentals of Information Security
Related ebooks
Practical Network Security: An auditee’s guide to zero findings Rating: 0 out of 5 stars0 ratings7 Rules to Influence Behaviour and Win at Cyber Security Awareness Rating: 5 out of 5 stars5/57 Rules To Become Exceptional At Cyber Security Rating: 5 out of 5 stars5/5Building an Effective Cybersecurity Program, 2nd Edition Rating: 0 out of 5 stars0 ratingsCybersecurity Risk Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCybersecurity ISMS Policies And Procedures A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsInformation Security Risk Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsSecuring the Cloud: Cloud Computer Security Techniques and Tactics Rating: 5 out of 5 stars5/5Privacy And Cybersecurity A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsInformation Security Governance: A Practical Development and Implementation Approach Rating: 0 out of 5 stars0 ratingsCyber Security Incident Response A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsDictionary of Information Security Rating: 1 out of 5 stars1/5Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents Rating: 0 out of 5 stars0 ratingsCybersecurity for Small Businesses and Nonprofits Rating: 0 out of 5 stars0 ratingsIntrusion Detection Systems A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsSoftware Development Security: CISSP, #8 Rating: 0 out of 5 stars0 ratingsCybersecurity Law, Standards and Regulations, 2nd Edition Rating: 0 out of 5 stars0 ratingsThe Manager’s Guide to Cybersecurity Law: Essentials for Today's Business Rating: 5 out of 5 stars5/5Information Security for Small and Midsized Businesses Rating: 0 out of 5 stars0 ratingsBusiness Practical Security Rating: 0 out of 5 stars0 ratingsSecurity Assessment and Testing: CISSP, #6 Rating: 2 out of 5 stars2/5Cyber-security regulation Third Edition Rating: 0 out of 5 stars0 ratingsCSA Guide to Cloud Computing: Implementing Cloud Privacy and Security Rating: 0 out of 5 stars0 ratingsThe Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Rating: 0 out of 5 stars0 ratingsCybersecurity for Healthcare Professionals Rating: 0 out of 5 stars0 ratingsA Convenient Guide to Starting You on Threat Modeling Rating: 0 out of 5 stars0 ratingsStart-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsInformation Security Architect A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsThe EU Data Protection Code of Conduct for Cloud Service Providers: A guide to compliance Rating: 0 out of 5 stars0 ratings
Programming For You
SQL: For Beginners: Your Guide To Easily Learn SQL Programming in 7 Days Rating: 5 out of 5 stars5/5Python: For Beginners A Crash Course Guide To Learn Python in 1 Week Rating: 4 out of 5 stars4/5Java for Beginners: A Crash Course to Learn Java Programming in 1 Week Rating: 5 out of 5 stars5/5Python Programming : How to Code Python Fast In Just 24 Hours With 7 Simple Steps Rating: 4 out of 5 stars4/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Python Machine Learning By Example Rating: 4 out of 5 stars4/5HTML & CSS: Learn the Fundaments in 7 Days Rating: 4 out of 5 stars4/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5Learn to Code. Get a Job. The Ultimate Guide to Learning and Getting Hired as a Developer. Rating: 5 out of 5 stars5/5Linux: Learn in 24 Hours Rating: 5 out of 5 stars5/5SQL All-in-One For Dummies Rating: 3 out of 5 stars3/5Pokemon Go: Guide + 20 Tips and Tricks You Must Read Hints, Tricks, Tips, Secrets, Android, iOS Rating: 5 out of 5 stars5/5101 Amazing Nintendo NES Facts: Includes facts about the Famicom Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Web Designer's Idea Book, Volume 4: Inspiration from the Best Web Design Trends, Themes and Styles Rating: 4 out of 5 stars4/5Python Projects for Beginners: A Ten-Week Bootcamp Approach to Python Programming Rating: 0 out of 5 stars0 ratingsModern C++ for Absolute Beginners: A Friendly Introduction to C++ Programming Language and C++11 to C++20 Standards Rating: 0 out of 5 stars0 ratingsLearn SQL in 24 Hours Rating: 5 out of 5 stars5/5Excel : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Excel Programming: 1 Rating: 5 out of 5 stars5/5
Reviews for Fundamentals of Information Security
0 ratings0 reviews
Book preview
Fundamentals of Information Security - Sanil Nadkarni
CHAPTER 1
Introduction to Information Security
Any informed borrower is simply less vulnerable to fraud and abuse.
- Alan Greenspan
Like everyone else, Anuj was very happy to surprise his parents on their 25th wedding anniversary. Coming from a middle-class family, possessing your own car is almost like a fantasy fulfilled. Anuj’s dad forever desired to possess his own car. But, weighed down with responsibilities, it seemed unlikely for him. Anuj knew just what he had to do. Procuring a new car did not seem to fit his pocket, so he decided to strike a pre-owned car online. While browsing through many online sites he stumbled upon an advertisement link. To his astonishment, the deal proposed an SUV car for only Rs. 100,000! Anuj could not keep himself and clicked on the link. No sooner had he clicked the link; he received an SMS stating that Rupees 1 lac had been transacted from his account. Before he could even perceive, his computer was hacked, and he was cheated out of his hard-earned cash. The police further said the incidence could have been avoided if he was aware and educated about cyber-crimes.
This is just one of the many incidents that happen every day. Read on to know more about information security and how to stay protected amidst a myriad of threats that lurk online.
Introduction to information security
I am sure you must have heard stories from your grandparents, gloating about how they maintained and safeguarded their documents. But, to our astonishment, long gone are those days when all our data was sheltered using traditional means. As we dwell in the 21st century, we have finally decided to pull our stakes and hold all our confidential data online. If we look closely, today more than 99% of the data and the organizations which hold it in a unified and compact manner are driven online.
But amidst this, is our crucial data really safe from outsider threats?
Every single modern-day business stores its data on servers, laptops, desktops, or any other crack or crevice on the internet. Regardless of the fact if you are a budding entrepreneur, holder of an MNC, or just any Tom, Dick, and Harry using the internet and its worldly privileges, securing, and safeguarding your data from black hats is extremely important.
If you want to keep away from being a sufferer and if you set your heart on educating yourself about information security, then today salvation has come your way through my book. In this chapter, we are going to see the importance of privacy, confidentiality, integrity, and availability of data in information security and why it is such a huge thing.
Structure
In this chapter, we will discuss the following topics:
Comprehend the essence of information security
What key principles drive information security?
Why is information security the need of the hour?
Objectives
After studying this chapter, you should be able to:
Understand the different facets of information security
Comprehend what motivates people to take up information security
Gain some insight into cyber crimes
What is information security?
The way the motto of human life is larger than emotional fulfillment, peace of mind, or even pleasure, similarly, the term information security was born with the purpose of shielding our intellectual and confidential data. And this pivotal purpose is served by safeguarding the crucial data of any organization from all sorts of unsolicited access, vulnerabilities, malicious usage, exposure, breach, embezzlement, tempering, split, etc. Not just this, information security also aims at reducing the high gradient of risks generated through threats.
The supreme motto of information security is to practice values such as confidentiality, integrity, and availability of data, all the while fighting and resisting any malignancy which will crop up in the way and pose information risk.
Have you ever wondered about the relevance of information security in the 21st century and the digital world?
If not, let me walk you through