SlideShare a Scribd company logo
1 of 7
Download to read offline
What is Information
Security and its
types?
Information security has been
assigned to look after the
protection of records and data
of organizations from
unauthorized access.
www.ecadema.com
Confidentiality
Focusing that the information couldn’t
be disclosed to any unauthorized
individuals, entities, and processes,
breaching confidentiality is taken care
of at a top-notch level.
www.ecadema.com
Integrity
Focusing on maintaining the accuracy and
entirety of the data. Suppose an employee of a
particular department left the organization
then all other departments will be informed
about the “job left” status so that data is
complete and accurate and in addition to this
only authorized persons should be allowed to
edit employee data.
www.ecadema.com
Availability
Whenever needed, data should be available and accessible to
authorized personalities to run the work process in a smooth
way. In case, one needs access to an employee’s profile and
working credentials, it requires collaboration from different
organizational teams like network operations, development
operations, incident response, and policy/change management.
www.ecadema.com
Non-repudiation
means that there couldn’t be any denial of sending or receiving the messages or
transactions. For instance, in cryptography, messages that match the digital
signature signed with the sender’s private key and that sender could have sent a
message and nobody else could have altered it in transit is sufficient.
www.ecadema.com
Authenticity
It claims the verification of the
users’ profile and the information
provided by the employee to be
true or not and its source. This
principle guarantees the validity of
the message source.
www.ecadema.com
Thank you!
Address- 651 N Broad St, Middletown
Middletown, DE 19709, United States
Mail id - ecadema0@gmail.com
Website - www.ecadema.com

More Related Content

Similar to What is Information Security and its types.pdf

Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
Nicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security background
Nicholas Davis
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
todd271
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
healdkathaleen
 

Similar to What is Information Security and its types.pdf (20)

Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure Communications
 
security IDS
security IDSsecurity IDS
security IDS
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxModule 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptx
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdf
 
Data Security.pdf
Data Security.pdfData Security.pdf
Data Security.pdf
 
Best Data Privacy certification.pdf
Best Data Privacy certification.pdfBest Data Privacy certification.pdf
Best Data Privacy certification.pdf
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
 
Ss
SsSs
Ss
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
An insight into information security.pdf
An insight into information security.pdfAn insight into information security.pdf
An insight into information security.pdf
 

More from Online Training

More from Online Training (20)

Overcoming Challenges in the Training of Trainers Strategies for Success.pdf
Overcoming Challenges in the Training of Trainers Strategies for Success.pdfOvercoming Challenges in the Training of Trainers Strategies for Success.pdf
Overcoming Challenges in the Training of Trainers Strategies for Success.pdf
 
Career Opportunities for Certified Management Accountants.pdf
Career Opportunities for Certified Management Accountants.pdfCareer Opportunities for Certified Management Accountants.pdf
Career Opportunities for Certified Management Accountants.pdf
 
The Role of a CFA in Today’s Financial Industry.pdf
The Role of a CFA in Today’s Financial Industry.pdfThe Role of a CFA in Today’s Financial Industry.pdf
The Role of a CFA in Today’s Financial Industry.pdf
 
Effective Cross-Cultural Communication in International HR.pdf
Effective Cross-Cultural Communication in International HR.pdfEffective Cross-Cultural Communication in International HR.pdf
Effective Cross-Cultural Communication in International HR.pdf
 
7 Essential IT Project Management Skills You Need to Succeed.pdf
7 Essential IT Project Management Skills You Need to Succeed.pdf7 Essential IT Project Management Skills You Need to Succeed.pdf
7 Essential IT Project Management Skills You Need to Succeed.pdf
 
Tips and Tricks for Working as an Accountant.pdf
Tips and Tricks for Working as an Accountant.pdfTips and Tricks for Working as an Accountant.pdf
Tips and Tricks for Working as an Accountant.pdf
 
10 Essential Skills for Project Management Professionals.pdf
10 Essential Skills for Project Management Professionals.pdf10 Essential Skills for Project Management Professionals.pdf
10 Essential Skills for Project Management Professionals.pdf
 
The Top 5 Skills for IT Project Managers
The Top 5 Skills for IT Project ManagersThe Top 5 Skills for IT Project Managers
The Top 5 Skills for IT Project Managers
 
What is a corporate trainer.pdf
What is a corporate trainer.pdfWhat is a corporate trainer.pdf
What is a corporate trainer.pdf
 
ecadema course offered
ecadema course offeredecadema course offered
ecadema course offered
 
Online education
Online educationOnline education
Online education
 
What is a corporate trainer (3).pdf
What is a corporate trainer (3).pdfWhat is a corporate trainer (3).pdf
What is a corporate trainer (3).pdf
 
Professional development - why it is important.pdf
Professional development - why it is important.pdfProfessional development - why it is important.pdf
Professional development - why it is important.pdf
 
EVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdf
EVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdfEVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdf
EVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdf
 
5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf
5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf
5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf
 
Online Learning Platform.pdf
Online Learning Platform.pdfOnline Learning Platform.pdf
Online Learning Platform.pdf
 
Corporate Training & Online Education.pdf
Corporate Training & Online Education.pdfCorporate Training & Online Education.pdf
Corporate Training & Online Education.pdf
 
5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf
5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf
5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf
 
Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...
Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...
Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...
 
Financial Risk Management.pdf
Financial Risk Management.pdfFinancial Risk Management.pdf
Financial Risk Management.pdf
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Recently uploaded (20)

ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 

What is Information Security and its types.pdf

  • 1. What is Information Security and its types? Information security has been assigned to look after the protection of records and data of organizations from unauthorized access. www.ecadema.com
  • 2. Confidentiality Focusing that the information couldn’t be disclosed to any unauthorized individuals, entities, and processes, breaching confidentiality is taken care of at a top-notch level. www.ecadema.com
  • 3. Integrity Focusing on maintaining the accuracy and entirety of the data. Suppose an employee of a particular department left the organization then all other departments will be informed about the “job left” status so that data is complete and accurate and in addition to this only authorized persons should be allowed to edit employee data. www.ecadema.com
  • 4. Availability Whenever needed, data should be available and accessible to authorized personalities to run the work process in a smooth way. In case, one needs access to an employee’s profile and working credentials, it requires collaboration from different organizational teams like network operations, development operations, incident response, and policy/change management. www.ecadema.com
  • 5. Non-repudiation means that there couldn’t be any denial of sending or receiving the messages or transactions. For instance, in cryptography, messages that match the digital signature signed with the sender’s private key and that sender could have sent a message and nobody else could have altered it in transit is sufficient. www.ecadema.com
  • 6. Authenticity It claims the verification of the users’ profile and the information provided by the employee to be true or not and its source. This principle guarantees the validity of the message source. www.ecadema.com
  • 7. Thank you! Address- 651 N Broad St, Middletown Middletown, DE 19709, United States Mail id - ecadema0@gmail.com Website - www.ecadema.com