• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Information security
 

Information security

on

  • 386 views

Entry level information security presentation for college freshman.

Entry level information security presentation for college freshman.

Statistics

Views

Total Views
386
Views on SlideShare
386
Embed Views
0

Actions

Likes
1
Downloads
45
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Hour presentation in the past. Data is the first thing that most will suggest to protect. System should be set up before data is saved. Not after. The topic of computer security is broad covering everything from secure data carried on a laptop to server farms of hundreds of computers.
  • Protect equipment, data, hardware, software, users from themselves. Don’t invest more in protection than you have value to protect.
  • A special foam can be used for fire protection – Halon – but very expensive. Part of hardware protection is teaching users how to handle devices from plugging and unplugging USB drives of all types, to portability – not dropping or abusing laptops or workstations.
  • Users must learn to protect their own data. One of the bigger problems I deal with.

Information security Information security Presentation Transcript

  • + information security Fundamentals
  • + Secure what?  Physical Assets Ultimately, the goal is to protect information.  Network/Commun However, to accomplish that goal physical ications assets must be secured and protected, and users must be educated, trained and  Data/Information responsible.  Users
  • + Evaluate  What is being protected?  hardware, software, confidential and proprietary information  Why?  your business image, business information, legal  Value?  Can you afford to lose “it”? Can you afford the legal costs?
  • + Layers of Protection  Physical Location  Devices  Data  Building  Flash Drive  Image Files  Office  Laptop  Text  Home  Workstation  Spreadsheet  Car  Smartphone  Database  Briefcase  Tablet  Data Center
  • + Hardware Physical Security  Fire protection  Climate control  Physical security
  • + UPS – Keeping Things Running  Uninterruptible Power Supply  Battery  Generator  Not just computers  Phones and TV  A/C (select areas)  Lighting (select areas)
  • + Network Infrastructure  Wireless access  User accounts  Firewalls  Physical  Software  Network monitoring software  Physical protection
  • + Data Protection  Backups  Global  User  Anti-  Malware  Virus  Adware  Worms  Trojans
  • + Data Protection  Email  Encrypted  Digital Signatures  Security Threats  Phishing Mails  Storage devices  User authentication  Do not share passwords or accounts  POS and PMS systems  Timekeeping  Money  PCI DSS(Payment Card Industry Data Security Standards) Compliance
  • + Making it Work  Education/Training/Accountability  Polices  Procedures  Documentation  Management  Accountability  Checks and balances
  • + The end  Conclusion  Questions?