The growth of electronic devices from the smart phone to the tablet has opened users to potential threats that
many do not realize exist. In many cases the user’s device can be compromised without their knowledge and they
can spread the malware to other users or have their hard drive formatted or worse. Regardless of the device, users
have to be aware of the threat in order to prevent themselves from becoming a victim. The presentation will cover
the principles of information security and how the individual can protect themselves. It will also introduce a new,
expanding area that offers employment in an interesting and challenging career field.
7. The Book:
• Whitman, M.E. and Mattord, H. J. (2012).
Principles of Information Security, 4th ed.
Course Technology, Cengage Learning,
Boston.
8. Book Contents:
• Introduction to Information Security
• The Need for Security
• Legal, Ethical, and Professional Issues in Information Security
• Risk Management
• Planning for Security
• Security Technology: Firewalls and VPNs
• Security Technology: Intrusion Detection and Prevention Systems,
and Other Security Tools
• Cryptography
• Physical Security
• Implementing Information Security
• Security and Personnel
• Information Security Maintenance
9. Employment in Information Security
• Jobs
– CIO
– CISO
– Information Security Manager
– Information Security Technician
10. Credentials
• International Information Systems Security Certification
Consortium (ISC)2
– Certified Information Systems Security Professional (CISSP)
– Systems Security Certified Practitioner (SSCP)
– Associate of (ISC)2
– Certification and Accreditation Professional (CAP)
• Information Systems Audit and Control Association (ISACA)
– Certified Information Systems Auditor (CISA)
– Certified Information Security Manager (CISM)
• SANS Global Information Assurance Certification (GIAC)
• Security Certified Program (SCP)
• CompTIA’s Security+ - one of the A+ series of professional tests