Information Systems
Security Fundamentals

Overview

Security is the practice of protecting information assets from unauthorized access, disruption, or destruction. This topic introduces common threats such as malware and social engineering, along with core safeguards—including authentication, encryption, and disaster‑recovery planning—that businesses of any size should implement.

Key Concepts and Controls

Step-by-Step Example

Scenario: A small e‑commerce startup stores customer data on a cloud VM. They recently experienced a phishing attack that compromised an employee account. Outline a layered security plan.

Step 1: Authentication – Enable multi‑factor authentication (MFA) for all cloud logins to reduce credential‑stuffing risk.

Step 2: Network Security – Deploy a cloud firewall and restrict SSH/RDP to specific IP ranges; enable IDS alerts.

Step 3: Data Protection – Encrypt databases at rest with AES‑256 and force TLS 1.3 for data in transit.

Step 4: Endpoint & Email – Implement spam filtering and mandatory security‑awareness training to mitigate phishing.

Step 5: Backup & Recovery – Schedule nightly incremental and weekly full backups to an off‑site region; test restores quarterly.

Final Answer: A defense‑in‑depth approach—MFA, network segmentation, encryption, user training, and tested backups—will dramatically reduce attack surface and speed recovery if an incident occurs.

Quick Tip

Apply the principle of least privilege: give users the minimum access necessary to perform their jobs. This single practice mitigates many internal and external threats.