Your SlideShare is downloading. ×
  • Like
Information security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Information security

  • 334 views
Published

 

Published in Technology , News & Politics
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
334
On SlideShare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
30
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Technology is only part of information security…..people and policy are just as (if not more) important than the technology itself.
  • Trojans are the viruses that automatically installed when you just double click on it!!!!!

Transcript

  • 1. By Yogeshwari.M Rubini.R
  • 2. What is Information?
    • Information is a processed data.
    • In other words, a result got after processing a raw fact.
  • 3. What is Security?
    • Dictionary.com says:
      • 1. Freedom from risk or danger; safety.
      • 2.Freedom from doubt, anxiety, or fear; confidence.
      • 3. Something that gives or assures safety, as:
        • 1. A group or department of private guards: Call building security if a visitor acts suspicious.
        • 2. Measures adopted by a government to prevent espionage, sabotage, or attack.
        • 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.
      • … etc.
  • 4. Definition of Information Security
    • Safe-guarding an organization’s data from unauthorised access or modification to ensure its , confidentiality, integrity and availability (CIA).
    • The protection of information and information systems against unauthorized access or modification of information.
    Confidential Information & Critical Systems Technical Administrative Physical
  • 5. 90/10 Rule 10% 90% Process Technology People
  • 6. State of Internet
    • According to Internetworldstats.com, there are slightly over 1.3 billion internet users worldwide.
    • Approx. 19% (18.9) or 237 million from North America
    • That means the other 81% are from the rest of the world.
    • Once connected to the internet your computer is accessible to those users.
  • 7. Key to Information Security
    • A password is essentially the last layer of defense to your computer and personal information.
    • You can have every other safeguard in place, if someone gets your password they are now able to access the information.
  • 8. Make your Keys in private
    • Lock your computer if you are going to be away from it so that anyone that wonders by cannot gain access to your computer and information.
    • Don’t share password with your friends.
  • 9. Surf Safely and Choose your RISK
    • You know there are bad parts of town that you don’t go to…
    • The Internet is the same way – be wary!
    • And be aware of TROJANS!!
  • 10. Be Aware of Trojan
    • A Trojan horse is an email virus usually released by an email attachment.
    • Trojan spread from computer to computer, but unlike a virus, it has the capability to travel without any human action…
    • The most common means of infection is through email attachments.
  • 11. Surf “safer” w/ SiteAdvisor
  • 12. Thank you!!!
    • Thank you for Giving us this GOLDEN oppourtunity!!!
  • 13. Queries???