Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

PG & Associates


Published on

Security of information in any business today is paramount so make sure you know how to manage your information if you don't want or jnow how to then get in the SME's(Subject Matter Experts) to lend you a hand.

  • Be the first to comment

  • Be the first to like this

PG & Associates

  1. 1. PG &Associates
  2. 2. Information SecurityConfidentialityIntegrityAvailability
  3. 3. Information SecurityConfidentialityAssurance that information is shared only among authorised persons ororganisations. Breaches of Confidentiality can occur when data is not handled ina manner adequate to safeguard the confidentiality of the informationconcerned. Such disclosure can take place by word of mouth, by printing,copying, e-mailing or creating documents and other data etc. The classificationof the information should determine is confidentiality and hence the appropriatesafeguards.
  4. 4. Information SecurityIntegrityAssurance that the information is authentic and complete. Ensuring thatinformation can be relied upon to be sufficiently accurate for its purpose. Theterm Integrity is used frequently when considering Information Security as it isrepresents one of the primary indicators of security (or lack of it). The integrityof data is not only whether the data is correct, but whether it can be trusted andrelied upon. For example, making copies (say by e-mailing a file) of a sensitivedocument, threatens both confidentiality and the integrity of the information.Why? Because, by making one or more copies, the data is then at risk of changeor modification.
  5. 5. Information SecurityAvailabilityAssurance that the systems responsible for delivering, storing and processinginformation are accessible when needed, by those who need them.
  6. 6. Confusion Information Security vs IT Security vs Data SecurityInformation Security is:The terms information security, computer security and informationassurance are frequently used interchangeably. These fields areinterrelated often and share the common goals of protecting theconfidentiality, integrity and availability of information; however, thereare some subtle differences between them.These differences lie primarily in the approach to the subject, themethodologies used, and the areas of concentration. Informationsecurity is concerned with the confidentiality, integrity and availabilityof data regardless of the form the data may take: electronic, print, orother forms.
  7. 7. Confusion Information Security vs IT Security vs Data SecurityIT (Information Technology) Security is:IT security is about protecting the integrity, accessibility, and reliabilityof electronic information and with the behaviors and actions ofcomputer users as they impact the privacy and safety of all members ofthe Internet community. IT security works with physical security toensure protection of information, whether electronic or hardcopy.
  8. 8. Confusion Information Security vs IT Security vs Data SecurityData Security is:In simple terms, data security is the practice of keeping data protectedfrom corruption and unauthorized access. The focus behind datasecurity is to ensure privacy while protecting personal or corporatedata.
  9. 9. Solution
  10. 10. Security Tiers
  11. 11. You Want More Talk to us at:Pg& +27 (0)12 346 0332
  12. 12. Information Security Services1. Physical Security2. Network Security3. Protocols / Services4. User Security5. Data Storage Security6. Passwords7. System Administration