SlideShare a Scribd company logo
1 of 7
Download to read offline
What is Information
Security and its
types?
Information security has been
assigned to look after the
protection of records and data
of organizations from
unauthorized access.
www.ecadema.com
Confidentiality
Focusing that the information couldn’t
be disclosed to any unauthorized
individuals, entities, and processes,
breaching confidentiality is taken care
of at a top-notch level.
www.ecadema.com
Integrity
Focusing on maintaining the accuracy and
entirety of the data. Suppose an employee of a
particular department left the organization
then all other departments will be informed
about the “job left” status so that data is
complete and accurate and in addition to this
only authorized persons should be allowed to
edit employee data.
www.ecadema.com
Availability
Whenever needed, data should be available and accessible to
authorized personalities to run the work process in a smooth
way. In case, one needs access to an employee’s profile and
working credentials, it requires collaboration from different
organizational teams like network operations, development
operations, incident response, and policy/change management.
www.ecadema.com
Non-repudiation
means that there couldn’t be any denial of sending or receiving the messages or
transactions. For instance, in cryptography, messages that match the digital
signature signed with the sender’s private key and that sender could have sent a
message and nobody else could have altered it in transit is sufficient.
www.ecadema.com
Authenticity
It claims the verification of the
users’ profile and the information
provided by the employee to be
true or not and its source. This
principle guarantees the validity of
the message source.
www.ecadema.com
Thank you!
Address- 651 N Broad St, Middletown
Middletown, DE 19709, United States
Mail id - ecadema0@gmail.com
Website - www.ecadema.com

More Related Content

Similar to What is Information Security and its types.pdf

Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
Nicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security background
Nicholas Davis
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
todd271
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
healdkathaleen
 

Similar to What is Information Security and its types.pdf (20)

Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure Communications
 
security IDS
security IDSsecurity IDS
security IDS
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxModule 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptx
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdf
 
Data Security.pdf
Data Security.pdfData Security.pdf
Data Security.pdf
 
Best Data Privacy certification.pdf
Best Data Privacy certification.pdfBest Data Privacy certification.pdf
Best Data Privacy certification.pdf
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
 
Ss
SsSs
Ss
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
An insight into information security.pdf
An insight into information security.pdfAn insight into information security.pdf
An insight into information security.pdf
 

More from Online Training

More from Online Training (20)

Overcoming Challenges in the Training of Trainers Strategies for Success.pdf
Overcoming Challenges in the Training of Trainers Strategies for Success.pdfOvercoming Challenges in the Training of Trainers Strategies for Success.pdf
Overcoming Challenges in the Training of Trainers Strategies for Success.pdf
 
Career Opportunities for Certified Management Accountants.pdf
Career Opportunities for Certified Management Accountants.pdfCareer Opportunities for Certified Management Accountants.pdf
Career Opportunities for Certified Management Accountants.pdf
 
The Role of a CFA in Today’s Financial Industry.pdf
The Role of a CFA in Today’s Financial Industry.pdfThe Role of a CFA in Today’s Financial Industry.pdf
The Role of a CFA in Today’s Financial Industry.pdf
 
Effective Cross-Cultural Communication in International HR.pdf
Effective Cross-Cultural Communication in International HR.pdfEffective Cross-Cultural Communication in International HR.pdf
Effective Cross-Cultural Communication in International HR.pdf
 
7 Essential IT Project Management Skills You Need to Succeed.pdf
7 Essential IT Project Management Skills You Need to Succeed.pdf7 Essential IT Project Management Skills You Need to Succeed.pdf
7 Essential IT Project Management Skills You Need to Succeed.pdf
 
Tips and Tricks for Working as an Accountant.pdf
Tips and Tricks for Working as an Accountant.pdfTips and Tricks for Working as an Accountant.pdf
Tips and Tricks for Working as an Accountant.pdf
 
10 Essential Skills for Project Management Professionals.pdf
10 Essential Skills for Project Management Professionals.pdf10 Essential Skills for Project Management Professionals.pdf
10 Essential Skills for Project Management Professionals.pdf
 
The Top 5 Skills for IT Project Managers
The Top 5 Skills for IT Project ManagersThe Top 5 Skills for IT Project Managers
The Top 5 Skills for IT Project Managers
 
What is a corporate trainer.pdf
What is a corporate trainer.pdfWhat is a corporate trainer.pdf
What is a corporate trainer.pdf
 
ecadema course offered
ecadema course offeredecadema course offered
ecadema course offered
 
Online education
Online educationOnline education
Online education
 
What is a corporate trainer (3).pdf
What is a corporate trainer (3).pdfWhat is a corporate trainer (3).pdf
What is a corporate trainer (3).pdf
 
Professional development - why it is important.pdf
Professional development - why it is important.pdfProfessional development - why it is important.pdf
Professional development - why it is important.pdf
 
EVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdf
EVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdfEVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdf
EVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdf
 
5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf
5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf
5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf
 
Online Learning Platform.pdf
Online Learning Platform.pdfOnline Learning Platform.pdf
Online Learning Platform.pdf
 
Corporate Training & Online Education.pdf
Corporate Training & Online Education.pdfCorporate Training & Online Education.pdf
Corporate Training & Online Education.pdf
 
5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf
5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf
5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf
 
Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...
Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...
Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...
 
Financial Risk Management.pdf
Financial Risk Management.pdfFinancial Risk Management.pdf
Financial Risk Management.pdf
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Recently uploaded (20)

How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 

What is Information Security and its types.pdf

  • 1. What is Information Security and its types? Information security has been assigned to look after the protection of records and data of organizations from unauthorized access. www.ecadema.com
  • 2. Confidentiality Focusing that the information couldn’t be disclosed to any unauthorized individuals, entities, and processes, breaching confidentiality is taken care of at a top-notch level. www.ecadema.com
  • 3. Integrity Focusing on maintaining the accuracy and entirety of the data. Suppose an employee of a particular department left the organization then all other departments will be informed about the “job left” status so that data is complete and accurate and in addition to this only authorized persons should be allowed to edit employee data. www.ecadema.com
  • 4. Availability Whenever needed, data should be available and accessible to authorized personalities to run the work process in a smooth way. In case, one needs access to an employee’s profile and working credentials, it requires collaboration from different organizational teams like network operations, development operations, incident response, and policy/change management. www.ecadema.com
  • 5. Non-repudiation means that there couldn’t be any denial of sending or receiving the messages or transactions. For instance, in cryptography, messages that match the digital signature signed with the sender’s private key and that sender could have sent a message and nobody else could have altered it in transit is sufficient. www.ecadema.com
  • 6. Authenticity It claims the verification of the users’ profile and the information provided by the employee to be true or not and its source. This principle guarantees the validity of the message source. www.ecadema.com
  • 7. Thank you! Address- 651 N Broad St, Middletown Middletown, DE 19709, United States Mail id - ecadema0@gmail.com Website - www.ecadema.com