import { Card, CardContent } from "@/components/ui/card";
import { Button } from "@/components/ui/button";
import { Lock, Shield, Database, Users } from "lucide-react";
import { motion } from "framer-motion";
export default function Week1IntroSecurity() {
return (
{/* Slide 1 */}
Introduction to Information Security
COMP 620 – Fall 2025
Instructor: Dr. Madhuri Siddula
{/* Slide 2 - Learning Objectives */}
Learning Objectives
- Define information security and its goals
- Understand the CIA triad
- Recognize categories of threats and attacks
- Explain the importance of security for society
{/* Slide 3 - What is InfoSec */}
What is Information Security?
Protection of information systems against unauthorized access, disclosure, modification, or destruction.
- Ensures reliability and trust
- Involves technical, physical, and administrative controls
{/* Slide 4 - CIA Triad */}
The CIA Triad
Confidentiality
Prevent unauthorized access
Integrity
Ensure data accuracy
Availability
Accessible when needed
{/* Slide 6 - Threat Landscape */}
Threat Landscape
👤 Human Threats (hackers, insiders)
💻 Technological Threats (malware, ransomware)
🌪️ Environmental Threats (natural disasters)
📧 Social Threats (phishing, engineering)
{/* Slide 7 - Real World Examples */}
Real-World Examples
- Equifax Breach (2017) – 147M records exposed
- Colonial Pipeline Ransomware (2021)
- Facebook–Cambridge Analytica Scandal
{/* Slide 10 - Interactive Discussion */}
Interactive Discussion
💡 Think of an online service you use daily (banking, social media, email).
- What security features can you identify?
- What privacy concerns exist?
{/* Slide 11 - Summary */}
Summary
✔ CIA triad is the foundation
✔ Multiple threat categories exist
✔ Privacy vs Security are distinct but related
{/* Slide 12 - Next Class */}
Next Class
Topic: Access Control & Cryptographic Fundamentals
Reading: Bishop, Chapters 1–2
);
}