{"id":81,"date":"2018-08-01T14:51:15","date_gmt":"2018-08-01T18:51:15","guid":{"rendered":"https:\/\/fs.wp.odu.edu\/ckirkpat\/?p=81"},"modified":"2018-08-01T14:51:15","modified_gmt":"2018-08-01T18:51:15","slug":"reading-1-an-introduction-to-information-security","status":"publish","type":"post","link":"https:\/\/fs.wp.odu.edu\/ckirkpat\/2018\/08\/01\/reading-1-an-introduction-to-information-security\/","title":{"rendered":"Reading 1 &#8211; An Introduction to Information Security"},"content":{"rendered":"<p>An Introduction to Information Security is a 70-page publication from the National Institute of Standards &amp; Technology.\u00a0 While this, like other government publications, are not filled with eye-catching\u00a0graphics or pictures, it does cover the fundamentals of building an Information Security program within an organization.\u00a0 Keep in mind, that organization can be any aspect of government (Federal, State, Local), as well as any commercial enterprise regardless of size (public or private).\u00a0 \u00a0The book has 10 chapters starting with basic definitions and includes sage information on the various elements of Information Security, Roles and Responsibilities of individual positions, vulnerabilities, Policies, Risk Management, as well as several other aspects of the field.\u00a0 It concludes with a discussion of the various &#8220;controls&#8221; an organization should have in place to ensure that the InfoSec program is working as expected.\u00a0 Rest assured, without these controls it will not!<\/p>\n<p>Anyway, I&#8217;m not asking for a detailed understanding of the various roles and responsibilities or other granular information.\u00a0 Instead, I want you to come away with a basic familiarity with\u00a0what it takes to set up an Information Security Program, starting with basic definitions.\u00a0 So, don&#8217;t worry about the details. We&#8217;ll cover the important ones in class. Rather, do become familiar with the broader concepts.\u00a0 For example, why are information policies needed?\u00a0 What exactly do we mean by risk management?\u00a0 Why shouldn&#8217;t we make absolutely certain we&#8217;re covering every single risk? What is Cryptography?<\/p>\n<a class=\"synved-social-button synved-social-button-share synved-social-size-48 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Ffs.wp.odu.edu%2Fckirkpat%2Fwp-json%2Fwp%2Fv2%2Fposts%2F81&#038;text=Hey%20check%20this%20out\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Share on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-48 synved-social-resolution-single synved-social-provider-reddit nolightbox\" data-provider=\"reddit\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Reddit\" href=\"https:\/\/www.reddit.com\/submit?url=https%3A%2F%2Ffs.wp.odu.edu%2Fckirkpat%2Fwp-json%2Fwp%2Fv2%2Fposts%2F81&#038;title=Reading%201%20%E2%80%93%20An%20Introduction%20to%20Information%20Security\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"reddit\" title=\"Share on Reddit\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/reddit.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-48 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Linkedin\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Ffs.wp.odu.edu%2Fckirkpat%2Fwp-json%2Fwp%2Fv2%2Fposts%2F81&#038;title=Reading%201%20%E2%80%93%20An%20Introduction%20to%20Information%20Security\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Share on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-48 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Share by email\" href=\"mailto:?subject=Reading%201%20%E2%80%93%20An%20Introduction%20to%20Information%20Security&#038;body=Hey%20check%20this%20out:%20https%3A%2F%2Ffs.wp.odu.edu%2Fckirkpat%2Fwp-json%2Fwp%2Fv2%2Fposts%2F81\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"mail\" title=\"Share by email\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/mail.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>An Introduction to Information Security is a 70-page publication from the National Institute of Standards &amp; Technology.\u00a0 While this, like other government publications, are not filled with eye-catching\u00a0graphics or pictures, it does cover the fundamentals of building an Information Security <a class=\"more-link\" href=\"https:\/\/fs.wp.odu.edu\/ckirkpat\/2018\/08\/01\/reading-1-an-introduction-to-information-security\/\">Continue reading <span class=\"screen-reader-text\">  Reading 1 &#8211; An Introduction to Information Security<\/span><span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":704,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[9],"tags":[],"_links":{"self":[{"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/posts\/81"}],"collection":[{"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/users\/704"}],"replies":[{"embeddable":true,"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/comments?post=81"}],"version-history":[{"count":1,"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/posts\/81\/revisions"}],"predecessor-version":[{"id":82,"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/posts\/81\/revisions\/82"}],"wp:attachment":[{"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/media?parent=81"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/categories?post=81"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/tags?post=81"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}