import { Card, CardContent } from "@/components/ui/card"; import { Button } from "@/components/ui/button"; import { Lock, Shield, Database, Users } from "lucide-react"; import { motion } from "framer-motion"; export default function Week1IntroSecurity() { return (
{/* Slide 1 */}

Introduction to Information Security

COMP 620 – Fall 2025

Instructor: Dr. Madhuri Siddula

{/* Slide 2 - Learning Objectives */}

Learning Objectives

{/* Slide 3 - What is InfoSec */}

What is Information Security?

Protection of information systems against unauthorized access, disclosure, modification, or destruction.

  • Ensures reliability and trust
  • Involves technical, physical, and administrative controls
{/* Slide 4 - CIA Triad */}

The CIA Triad

Confidentiality

Prevent unauthorized access

Integrity

Ensure data accuracy

Availability

Accessible when needed

{/* Slide 6 - Threat Landscape */}

Threat Landscape

👤 Human Threats (hackers, insiders)
💻 Technological Threats (malware, ransomware)
🌪️ Environmental Threats (natural disasters)
📧 Social Threats (phishing, engineering)
{/* Slide 7 - Real World Examples */}

Real-World Examples

{/* Slide 10 - Interactive Discussion */}

Interactive Discussion

💡 Think of an online service you use daily (banking, social media, email).

{/* Slide 11 - Summary */}

Summary

✔ CIA triad is the foundation

✔ Multiple threat categories exist

✔ Privacy vs Security are distinct but related

{/* Slide 12 - Next Class */}

Next Class

Topic: Access Control & Cryptographic Fundamentals

Reading: Bishop, Chapters 1–2

); }