dnts 00 - module introduction.pdf
TRANSCRIPT
REGIONAL DEPARTMENT OF DEFENSE RESOURCES MANAGEMENT STUDIES
Click to edit Master title styleClick to edit Master title style
• Click to edit Master text styles• Second level• Third level• Fourth level• Fifth level
Information Security ManagementInformation Security Management
MODULE 1MODULE 1Data Networks and Data Networks and
Telecommunications SecurityTelecommunications Security
Presented byLTC PhD. eng. Cezar Vasilescu
REGIONAL DEPARTMENT OF DEFENSE RESOURCES MANAGEMENT STUDIES
Click to edit Master title styleClick to edit Master title style
• Click to edit Master text styles• Second level• Third level• Fourth level• Fifth level
WhoWho areare we?we?
• An intellectual community–prepared to contribute with own
knowledge, experience and ideas
REGIONAL DEPARTMENT OF DEFENSE RESOURCES MANAGEMENT STUDIES
Click to edit Master title styleClick to edit Master title style
• Click to edit Master text styles• Second level• Third level• Fourth level• Fifth level
Expectations: These Classes Expectations: These Classes
ARE ARE NOT
Executive Education
Focused on Synthesis
Multiple Answers
Critical Thinking
WHAT & WHY
To know what you don’t know
Technical Training
Focused on Analysis
“School Solutions”
Memorization
HOW
Know it all
REGIONAL DEPARTMENT OF DEFENSE RESOURCES MANAGEMENT STUDIES
Click to edit Master title styleClick to edit Master title style
• Click to edit Master text styles• Second level• Third level• Fourth level• Fifth level
““RulesRules””• Courtesy
• listen to each other
• Respect & tolerance to different opinions
• Listen actively• Academic freedom
• We encourage intellectual exploration and discussion.
• Non-Attribution• Class discussions stay in the seminar room
REGIONAL DEPARTMENT OF DEFENSE RESOURCES MANAGEMENT STUDIES
Click to edit Master title styleClick to edit Master title style
• Click to edit Master text styles• Second level• Third level• Fourth level• Fifth level
The MethodThe Method
• Seminar – a topical discussion conducted in a collegial atmosphere
• Participative – each contributes with valuable experience and perspectives
• Assessments – practice new skills and employ new approaches in a non-threatening atmosphere
REGIONAL DEPARTMENT OF DEFENSE RESOURCES MANAGEMENT STUDIES
Click to edit Master title styleClick to edit Master title style
• Click to edit Master text styles• Second level• Third level• Fourth level• Fifth level
AGENDAAGENDA1. The Principles of Information Security2. Networking3. Network security devices4. Network security techniques5. Threats and vulnerabilities6. Vulnerabilities management7. Security policies and awareness8. Risk management9. Incident response10. Disaster recovery and business continuity11. Exercise - Wireless Networks Security
REGIONAL DEPARTMENT OF DEFENSE RESOURCES MANAGEMENT STUDIES
Click to edit Master title styleClick to edit Master title style
• Click to edit Master text styles• Second level• Third level• Fourth level• Fifth level
Expectations: Expectations: Most of All, these classes Most of All, these classes
are for all of us to:are for all of us to:Learn Grow Explore Discover Listen
Understand Research Think Critically
Explain Try Innovate Inquire Network
Develop Create Assess Evaluate
Do your best Have fun