SlideShare a Scribd company logo
1 of 12
Record management in cyber security is the process of
creating, storing, and managing digital records in a
secure and organized manner. This includes ensuring
that records are properly classified, stored, and
protected from unauthorized access or modification. It
also involves regularly auditing and monitoring records
to ensure their accuracy and integrity.
Different Types of Security In Records Management
Security threats in records
management come from all
directions ranging from malware
and data breaches to theft, fire,
or flood, making it essential to
incorporate multiple types of
security in records management.
Locked Storage Areas
Using locks in storage areas like filing
cabinets is the first and easiest method for
securing paper files. By keeping them
locked it will keep prying eyes away and the
records safe from theft.
Fire and Flood Protection
Although natural disasters are still
a risk to filing cabinets in an office
even if they’re locked, off-site
records storage facilities use fire-
suppression and climate-control
systems to protect from natural
disasters.
In addition to natural disaster
protections, off-site storage facilities
also implement securities like 24/7
video monitoring, locked premises,
and on-site security staff.
Secure Storage Facilities
ACLs are used for limiting access to
sensitive files for only those who
need it. Predefined lists with
authorized users can be configured
while any other prying eyes are
locked out.
Access Control Lists (ACL)
Why Using Different Security
Types Is Important
Organizations face a range of
security threats that come from all
different angles, including:
•Employee theft and misuse of
information
•Fire, flood, and other natural disasters
•Data breaches caused by viruses,
trojans, and other forms of malware
Ultimately, Records Management
ensures that institutional records
of vital historical, fiscal, and legal
value are identified and
preserved, and that non-essential
records are discarded in a timely
manner according to established
guidelines and identified
legislation.
why is records management important

More Related Content

Similar to DOC-20230324-WA0005..pptx

security measures sfbwfnejemnedgqhqthqeneqansfbfb
security measures sfbwfnejemnedgqhqthqeneqansfbfbsecurity measures sfbwfnejemnedgqhqthqeneqansfbfb
security measures sfbwfnejemnedgqhqthqeneqansfbfbstrawberrycheesecake8
 
Importance of Access Control Systems for Business Security.pdf
Importance of Access Control Systems for Business Security.pdfImportance of Access Control Systems for Business Security.pdf
Importance of Access Control Systems for Business Security.pdfLaurajonath
 
Why Use Access Control Systems.pdf
Why Use Access Control Systems.pdfWhy Use Access Control Systems.pdf
Why Use Access Control Systems.pdfJaydenRees1
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend
 
How Pathology Lab Software Can Enhance Data Security.pptx
How Pathology Lab Software Can Enhance Data Security.pptxHow Pathology Lab Software Can Enhance Data Security.pptx
How Pathology Lab Software Can Enhance Data Security.pptxMocDoc
 
Information security
Information securityInformation security
Information securitySanjay Tiwari
 
Microsoft 365 Cloud Storage Solution - Is it secure - SADS IT.pdf
Microsoft 365 Cloud Storage Solution - Is it secure - SADS IT.pdfMicrosoft 365 Cloud Storage Solution - Is it secure - SADS IT.pdf
Microsoft 365 Cloud Storage Solution - Is it secure - SADS IT.pdfonline Marketing
 
Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...Hybrid Cloud
 
Cyber security
Cyber securityCyber security
Cyber securityPrem Raval
 
Cloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdfCloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdfmanoharparakh
 
Information Security
Information Security Information Security
Information Security Alok Katiyar
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
Cyer security
Cyer securityCyer security
Cyer securitywindows21
 
Mis presentation by suraj vaidya
Mis presentation by suraj vaidyaMis presentation by suraj vaidya
Mis presentation by suraj vaidyaSuraj Vaidya
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general attSHIVA101531
 
SECURITY CONTROLS
SECURITY CONTROLSSECURITY CONTROLS
SECURITY CONTROLSsuccessdsp
 
How to secure your company's financial data in 4 simple steps..pdf
How to secure your company's financial data in 4 simple steps..pdfHow to secure your company's financial data in 4 simple steps..pdf
How to secure your company's financial data in 4 simple steps..pdfJose thomas
 
How Balabit helps to comply with iso 27001 (infographics)
How Balabit helps to comply with iso 27001  (infographics)How Balabit helps to comply with iso 27001  (infographics)
How Balabit helps to comply with iso 27001 (infographics)Sectricity
 

Similar to DOC-20230324-WA0005..pptx (20)

security measures sfbwfnejemnedgqhqthqeneqansfbfb
security measures sfbwfnejemnedgqhqthqeneqansfbfbsecurity measures sfbwfnejemnedgqhqthqeneqansfbfb
security measures sfbwfnejemnedgqhqthqeneqansfbfb
 
Importance of Access Control Systems for Business Security.pdf
Importance of Access Control Systems for Business Security.pdfImportance of Access Control Systems for Business Security.pdf
Importance of Access Control Systems for Business Security.pdf
 
Why Use Access Control Systems.pdf
Why Use Access Control Systems.pdfWhy Use Access Control Systems.pdf
Why Use Access Control Systems.pdf
 
Record management.bose
Record management.boseRecord management.bose
Record management.bose
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
How Pathology Lab Software Can Enhance Data Security.pptx
How Pathology Lab Software Can Enhance Data Security.pptxHow Pathology Lab Software Can Enhance Data Security.pptx
How Pathology Lab Software Can Enhance Data Security.pptx
 
Information security
Information securityInformation security
Information security
 
Microsoft 365 Cloud Storage Solution - Is it secure - SADS IT.pdf
Microsoft 365 Cloud Storage Solution - Is it secure - SADS IT.pdfMicrosoft 365 Cloud Storage Solution - Is it secure - SADS IT.pdf
Microsoft 365 Cloud Storage Solution - Is it secure - SADS IT.pdf
 
Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdfCloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdf
 
Information Security
Information Security Information Security
Information Security
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
Cyer security
Cyer securityCyer security
Cyer security
 
Mis presentation by suraj vaidya
Mis presentation by suraj vaidyaMis presentation by suraj vaidya
Mis presentation by suraj vaidya
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
 
Iso 27001
Iso 27001Iso 27001
Iso 27001
 
SECURITY CONTROLS
SECURITY CONTROLSSECURITY CONTROLS
SECURITY CONTROLS
 
How to secure your company's financial data in 4 simple steps..pdf
How to secure your company's financial data in 4 simple steps..pdfHow to secure your company's financial data in 4 simple steps..pdf
How to secure your company's financial data in 4 simple steps..pdf
 
How Balabit helps to comply with iso 27001 (infographics)
How Balabit helps to comply with iso 27001  (infographics)How Balabit helps to comply with iso 27001  (infographics)
How Balabit helps to comply with iso 27001 (infographics)
 

Recently uploaded

Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024CapitolTechU
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/siemaillard
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptxHVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptxKunal10679
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryEugene Lysak
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfmstarkes24
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Mark Carrigan
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxCeline George
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxMohamed Rizk Khodair
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...Nguyen Thanh Tu Collection
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Denish Jangid
 
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING IIII BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING IIagpharmacy11
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Celine George
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxNehaChandwani11
 

Recently uploaded (20)

Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptxHVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING IIII BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 

DOC-20230324-WA0005..pptx

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Record management in cyber security is the process of creating, storing, and managing digital records in a secure and organized manner. This includes ensuring that records are properly classified, stored, and protected from unauthorized access or modification. It also involves regularly auditing and monitoring records to ensure their accuracy and integrity.
  • 6. Different Types of Security In Records Management Security threats in records management come from all directions ranging from malware and data breaches to theft, fire, or flood, making it essential to incorporate multiple types of security in records management.
  • 7. Locked Storage Areas Using locks in storage areas like filing cabinets is the first and easiest method for securing paper files. By keeping them locked it will keep prying eyes away and the records safe from theft.
  • 8. Fire and Flood Protection Although natural disasters are still a risk to filing cabinets in an office even if they’re locked, off-site records storage facilities use fire- suppression and climate-control systems to protect from natural disasters.
  • 9. In addition to natural disaster protections, off-site storage facilities also implement securities like 24/7 video monitoring, locked premises, and on-site security staff. Secure Storage Facilities
  • 10. ACLs are used for limiting access to sensitive files for only those who need it. Predefined lists with authorized users can be configured while any other prying eyes are locked out. Access Control Lists (ACL)
  • 11. Why Using Different Security Types Is Important Organizations face a range of security threats that come from all different angles, including: •Employee theft and misuse of information •Fire, flood, and other natural disasters •Data breaches caused by viruses, trojans, and other forms of malware
  • 12. Ultimately, Records Management ensures that institutional records of vital historical, fiscal, and legal value are identified and preserved, and that non-essential records are discarded in a timely manner according to established guidelines and identified legislation. why is records management important