Hello, and welcome to Information Security: The Big Picture. My name is Stephen Fried, and over the course of the next six hours I will be guiding you on a tour of the world of information security. This course provides an introduction into the area of computer and network security. As more and more people and companies connect to the Internet, the incidence of hacker attacks, break-ins, and vandalism continues to increase. | Information Security The Big Picture - Part I Stephen Fried Information Security The Big Picture - SANS GIAC 2000 Hello and welcome to Information Security The Big Picture. My name is Stephen Fried and over the course of the next six hours I will be guiding you on a tour of the world of information security. This course provides an introduction into the area of computer and network security. As more and more people and companies connect to the Internet the incidence of hacker attacks break-ins and vandalism continues to increase. With this comes an increasing need for trained professionals to understand and combat this growing threat. This course will teach you the basics you need to begin securing your systems against threats from both inside and outside your organization. The course takes a high-level approach touching on many different topics in an overview style. The information here is presented in plain English not technical jargon so students from all backgrounds can understand the material and begin to apply the concepts immediately. Technical concepts . communications technology networking protocols are explained thoroughly in an easy-to-understand manner allowing even non-technical students to understand these areas. We rely heavily on real-world examples and common-sense descriptions enabling students to take their own real world experiences and apply them to the information security arena. So without further ado let s get started. 1 Preface Course is designed to give a broad introduction to information security Use of real-world analogies to explain security concepts Will not go into too much technical depth Some technical descriptions may be oversimplified Use of sample data - not real Information Security The Big Picture - SANS GIAC 2000 2 As stated before this course is designed to give the student an introduction to the broad spectrum of topics that are covered under the umbrella of Information Security. To completely and thoroughly discuss all .