SlideShare a Scribd company logo
1 of 16
CYBER SECURITY
INTRODUCTION (UNIT-1)
INFORMATION SYSTEM
Information System refers to the knowledge or fact about any particular
subject/person or thing. The various aspects including like gathering,
handling, processing, storing, encrypting, releasing & disposing of data
for completing the transmission.
Information System is an integrated structure that compiles the services
of software, human resources and physical components of technology
to gather, store, process & retrieve the information whenever required,
in a useful form. This information is used by an individual or an
organization for planning, decision-making & various purposes for the
smooth running of the organization.
NEED FOR INFORMATION SYSTEM
Collection & storage of various types of data in accounts
Keeping record of employees
Customer Relationship Management
Planning
Preparing Alternative Course of Action
Decision-Making
Faster communication of a message among the employees
Competitive Advantage over other organization
TYPES OF INFORMATION SYSTEM
Executive Support System
Expert System
Decision Support System
Management Information
System
Office Information System
Transaction Processing
System
ELEMENTS OF INFORMATION SYSTEM
Connection
Media &
Network
Methods
Information
Human
Resource
Hardware
Software
DEVELOPMENT OF INFORMATION SYSTEM
Development of Information System has been interpreted as an
organized collection of concept, methods or techniques or set of goal
oriented procedure which are intending to guide the work in the
corporation of various parties involved in the guiding of an information
system.
“The desirable result or objective of the whole process of development
is to implement a functioning system, which will satisfy the end user in
its functionality and uses interfaces.”
SYSTEM DEVELOPMENT LIFE CYCLE
Identify
Problems
Information
Collecting Data
Analyzing
System Needs
& Budget
Designing The
System
Software
Development
Testing,
Monitoring Or
Evaluating
Hardware
Selection
Implementation
Follow-Up
INTRODUCTION TO INFORMATION SECURITY
According to Merriam-Webster’s online dictionary, information is
defined as:
“ Knowledge obtained from investigation, study, or instruction,
intelligence, news, facts, data, a signal or character (as in a
communication system or computer) representing data, something (as a
message experimental data, or a picture) which justifies change in a
construct (as a plan or theory) that represents physical or mental
experience or another construct.”
And Security is defined as:
“freedom from danger, safety; freedom from fear or anxiety.”
Thus, Information Security can be defined as:
“Measures adopted to prevent the unauthorized use, misuse,
modification or denial of use of knowledge, facts, data or capabilities.”
NEED FOR INFORMATION SECURITY
 To secure information about the type of hardware/software the
organization is working on.
To control access to personal details of employees like control files,
password, address, phone number, etc.
To secure the information about the future plans & strategies of the
organization.
To secure the detailed information of the security plans of the
organization.
To secure information about the network connection, system
configuration and the encryption algorithms used by the organization.
INFORMATION SECURITY = CONFIDENTIALITY +
INTEGRITY + AVAILABILITY + AUTHENTICATION
BASIC PILLARS OF INFORMATION SECURITY
Confidentiality
Integrity
Availability
THREATS TO INFORMATION SYSTEM
NATURAL DISASTERS: Information can be lost, down time or loss
of productivity can occur, and damage to hardware can disrupt other
essential services.
HUMAN THREATS: Malicious Threats consist of inside attacks by
malicious employees & outside attacks by non-employees just looking
to harm and disrupt an organization. It can gain access in many ways
such as:
Viruses
Worm
Trapdoors
Logic Bombs
Mail Bombing
Zombie
Trojan Horse
INFORMATION ASSURANCE
Information Assurance is the process which ensures
confidentiality, integrity, availability, authentication and non-
repudiation of information system by using physical, technical and
administrative controls. This is not only valid for digital form of
data but it is also valid for analog form of data.
CYBER SECURITY
Cyber Security is more about monitoring behaviors and our cyber
monitoring efforts. Cyber Security refers to techniques and
technologies designed to protect computers, networks and data from
attacks, vulnerabilities and unauthorized access launched via internet
by cyber criminals. It applies security measures to ensure
confidentiality, integrity & availability of data. It specializes in the
area of network behavior analysis.
SECURITY RISK ANALYSIS
A risk analysis is the process of identifying the assets you wish to
protect and the potential threats against them. Risk Analysis is most
important process of risk management. It identifies & evaluate the risk
which have to be eliminated, controlled or accept it.
It is the concept that forms the basis for what we call security. If we
talk in terms of security then we can say that, risk is the potential for
less that requires protection. If there is no risk, there is no need of
security.
Risk= Threat * Vulnerability * Asset
SUBMITTED BY: SAMANVAY JAIN
Roll No: 1605470077
Batch: MBA 4th Sem.
(2017-18)
THANK YOU
Submitted To: Ms. Sandhya Singh
(Lecturer)

More Related Content

What's hot

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awarenessRishab garg
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber securityyatendrakumar47
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedProf .Pragati Khade
 
Cyer security
Cyer securityCyer security
Cyer securitywindows21
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness programAvanzo net
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsJohn Gilligan
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionStephen Cobb
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security pptGryffin EJ
 

What's hot (20)

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Cyber security
Cyber securityCyber security
Cyber security
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Cyer security
Cyer securityCyer security
Cyer security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 

Similar to An Introduction to Cyber security

Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxInfosectrain3
 
Infromation securiity
Infromation securiityInfromation securiity
Infromation securiityAamir Sohail
 
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxModule 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxHumphrey Humphrey
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docxmoggdede
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Information security
Information securityInformation security
Information securitySanjay Tiwari
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information SystemDaryl Conson
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 

Similar to An Introduction to Cyber security (20)

Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Data Security
Data SecurityData Security
Data Security
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
Security Ch-1.pptx
Security Ch-1.pptxSecurity Ch-1.pptx
Security Ch-1.pptx
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
CC ss.pptx
CC ss.pptxCC ss.pptx
CC ss.pptx
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
 
Infromation securiity
Infromation securiityInfromation securiity
Infromation securiity
 
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxModule 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptx
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
security IDS
security IDSsecurity IDS
security IDS
 
Information security
Information securityInformation security
Information security
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Data security
Data securityData security
Data security
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

An Introduction to Cyber security

  • 2. INFORMATION SYSTEM Information System refers to the knowledge or fact about any particular subject/person or thing. The various aspects including like gathering, handling, processing, storing, encrypting, releasing & disposing of data for completing the transmission. Information System is an integrated structure that compiles the services of software, human resources and physical components of technology to gather, store, process & retrieve the information whenever required, in a useful form. This information is used by an individual or an organization for planning, decision-making & various purposes for the smooth running of the organization.
  • 3. NEED FOR INFORMATION SYSTEM Collection & storage of various types of data in accounts Keeping record of employees Customer Relationship Management Planning Preparing Alternative Course of Action Decision-Making Faster communication of a message among the employees Competitive Advantage over other organization
  • 4. TYPES OF INFORMATION SYSTEM Executive Support System Expert System Decision Support System Management Information System Office Information System Transaction Processing System
  • 5. ELEMENTS OF INFORMATION SYSTEM Connection Media & Network Methods Information Human Resource Hardware Software
  • 6. DEVELOPMENT OF INFORMATION SYSTEM Development of Information System has been interpreted as an organized collection of concept, methods or techniques or set of goal oriented procedure which are intending to guide the work in the corporation of various parties involved in the guiding of an information system. “The desirable result or objective of the whole process of development is to implement a functioning system, which will satisfy the end user in its functionality and uses interfaces.”
  • 7. SYSTEM DEVELOPMENT LIFE CYCLE Identify Problems Information Collecting Data Analyzing System Needs & Budget Designing The System Software Development Testing, Monitoring Or Evaluating Hardware Selection Implementation Follow-Up
  • 8. INTRODUCTION TO INFORMATION SECURITY According to Merriam-Webster’s online dictionary, information is defined as: “ Knowledge obtained from investigation, study, or instruction, intelligence, news, facts, data, a signal or character (as in a communication system or computer) representing data, something (as a message experimental data, or a picture) which justifies change in a construct (as a plan or theory) that represents physical or mental experience or another construct.” And Security is defined as: “freedom from danger, safety; freedom from fear or anxiety.” Thus, Information Security can be defined as: “Measures adopted to prevent the unauthorized use, misuse, modification or denial of use of knowledge, facts, data or capabilities.”
  • 9. NEED FOR INFORMATION SECURITY  To secure information about the type of hardware/software the organization is working on. To control access to personal details of employees like control files, password, address, phone number, etc. To secure the information about the future plans & strategies of the organization. To secure the detailed information of the security plans of the organization. To secure information about the network connection, system configuration and the encryption algorithms used by the organization.
  • 10. INFORMATION SECURITY = CONFIDENTIALITY + INTEGRITY + AVAILABILITY + AUTHENTICATION
  • 11. BASIC PILLARS OF INFORMATION SECURITY Confidentiality Integrity Availability
  • 12. THREATS TO INFORMATION SYSTEM NATURAL DISASTERS: Information can be lost, down time or loss of productivity can occur, and damage to hardware can disrupt other essential services. HUMAN THREATS: Malicious Threats consist of inside attacks by malicious employees & outside attacks by non-employees just looking to harm and disrupt an organization. It can gain access in many ways such as: Viruses Worm Trapdoors Logic Bombs Mail Bombing Zombie Trojan Horse
  • 13. INFORMATION ASSURANCE Information Assurance is the process which ensures confidentiality, integrity, availability, authentication and non- repudiation of information system by using physical, technical and administrative controls. This is not only valid for digital form of data but it is also valid for analog form of data.
  • 14. CYBER SECURITY Cyber Security is more about monitoring behaviors and our cyber monitoring efforts. Cyber Security refers to techniques and technologies designed to protect computers, networks and data from attacks, vulnerabilities and unauthorized access launched via internet by cyber criminals. It applies security measures to ensure confidentiality, integrity & availability of data. It specializes in the area of network behavior analysis.
  • 15. SECURITY RISK ANALYSIS A risk analysis is the process of identifying the assets you wish to protect and the potential threats against them. Risk Analysis is most important process of risk management. It identifies & evaluate the risk which have to be eliminated, controlled or accept it. It is the concept that forms the basis for what we call security. If we talk in terms of security then we can say that, risk is the potential for less that requires protection. If there is no risk, there is no need of security. Risk= Threat * Vulnerability * Asset
  • 16. SUBMITTED BY: SAMANVAY JAIN Roll No: 1605470077 Batch: MBA 4th Sem. (2017-18) THANK YOU Submitted To: Ms. Sandhya Singh (Lecturer)