Security and Privacy?
Dr.abdalla sayed
What is information security?
• Information security protects all types of data (not just personal)
from unauthorized access, breaches, or loss.
• Examples:
Encryption of Bank Transactions (Data remains unreadable if
intercepted)
Firewalls & Antivirus (Prevent cyberattacks)
Access Control in Companies (Employees can only access relevant
files)
What is information security?
Confidentiality?
• Data being stored is safe from unauthorized access & use
• This ensures confidentiality, meaning that only the intended recipient
can access the message, protecting it from eavesdropping, hackers, or
even the service provider itself.
• A real-world example of confidentiality in information security is the
way end-to-end encryption (E2EE) works in messaging apps like
WhatsApp, Signal, or Telegram (secret chats).
Integrity
• Data is reliable and accurate. i.e., you get the “right” data
• Example : Healthcare: Integrity in Electronic Health Records (EHRs) ,
windows updates
Availability?
• The system or data is available for use when it is needed
What is privacy?
• Privacy in information security refers to protecting personal data
from unauthorized access, collection, or misuse while ensuring users
have control over their information.
• Example:
• GDPR Cookie Consent (Websites must ask before tracking users)
Private Mode in Browsers (No history or tracking)
Medical Records Access (Only authorized doctors can view patient
data)
Key Differences
Aspect Privacy Information Security
Focus Protecting personal data Securing all types of data
Control User decides who accesses data
Organization prevents
unauthorized access
Example Hiding social media profile Using encryption for emails
• Three Key Assets to Protect:
Hardware (Physical devices like servers, computers, mobile
phones)
Software (Applications, operating systems, security tools)
Data (User information, business records, encrypted files)
Hardware Security
• What is Hardware Security?
• Protecting physical devices from theft, damage, or tampering.
• Key Threats:
Device Theft (Laptops, USB drives, smartphones)
Unauthorized Access (Unprotected servers, unencrypted drives)
Hardware Failure (Data loss due to malfunction)
• Security Measures:
Encryption (Encrypt hard drives to prevent unauthorized access)
Access Controls (Use biometric authentication, smart cards)
Physical Security (Lock servers, use CCTV & access logs)
Software Security
• What is Software Security?
• Ensuring applications and systems are free from vulnerabilities.
• Key Threats:
Malware & Viruses (Compromising software integrity)
Unpatched Software (Hackers exploit outdated systems)
Unauthorized Software Access (Hackers manipulating apps)
• Security Measures:
Regular Software Updates (Patch vulnerabilities)
Firewalls & Antivirus (Prevent malware infections)
Application Security Testing (Find and fix bugs)
What is Data Security?
• What is Data Security?
• Protecting digital information from unauthorized access and
corruption.
• Key Threats:
Data Breaches (Hackers stealing sensitive data)
Ransomware Attacks (Encrypting data for ransom)
Unauthorized Data Sharing (Leaking private information)
• Security Measures:
Data Encryption (Protect files at rest and in transit)
Access Control (Only authorized users can view/edit data)
Regular Backups (Ensure data recovery in case of attacks)
• Key Threats to Data Security & Privacy:
Loss or Harm
Interception
Interruption
Modification
Fabrication
Loss or Harm
• Definition:
• Data is lost, deleted, or damaged, making it unusable or
irrecoverable.
• Causes:
Accidental deletion or hardware failure
Cyberattacks (ransomware, malware)
Physical damage (fire, flood, theft)
Interception
• Definition:
• Data is intercepted during transmission by an unauthorized party.
• Examples:
Man-in-the-Middle (MITM) attacks
Packet sniffing on public Wi-Fi
Interruption
• Definition:
Disrupts data availability or system operations.
• Examples:
Distributed Denial-of-Service (DDoS) attacks
Server crashes or power outages
Ransomware locking critical systems
Modification
• Definition:
• Unauthorized alteration of data, affecting its integrity.
• Examples:
Database tampering
Malware modifying financial transactions
Unauthorized edits in Electronic Health Records (EHRs)
Fabrication
• Definition:
• Fake or unauthorized data is created, misleading systems or users.
• Examples:
Fake accounts in banking apps
Phishing emails with malicious links
Spoofed transactions in financial systems

Chapter1 Information and Network Security

  • 1.
  • 2.
    What is informationsecurity? • Information security protects all types of data (not just personal) from unauthorized access, breaches, or loss. • Examples: Encryption of Bank Transactions (Data remains unreadable if intercepted) Firewalls & Antivirus (Prevent cyberattacks) Access Control in Companies (Employees can only access relevant files)
  • 3.
  • 4.
    Confidentiality? • Data beingstored is safe from unauthorized access & use • This ensures confidentiality, meaning that only the intended recipient can access the message, protecting it from eavesdropping, hackers, or even the service provider itself. • A real-world example of confidentiality in information security is the way end-to-end encryption (E2EE) works in messaging apps like WhatsApp, Signal, or Telegram (secret chats).
  • 5.
    Integrity • Data isreliable and accurate. i.e., you get the “right” data • Example : Healthcare: Integrity in Electronic Health Records (EHRs) , windows updates
  • 6.
    Availability? • The systemor data is available for use when it is needed
  • 7.
    What is privacy? •Privacy in information security refers to protecting personal data from unauthorized access, collection, or misuse while ensuring users have control over their information. • Example: • GDPR Cookie Consent (Websites must ask before tracking users) Private Mode in Browsers (No history or tracking) Medical Records Access (Only authorized doctors can view patient data)
  • 8.
    Key Differences Aspect PrivacyInformation Security Focus Protecting personal data Securing all types of data Control User decides who accesses data Organization prevents unauthorized access Example Hiding social media profile Using encryption for emails
  • 9.
    • Three KeyAssets to Protect: Hardware (Physical devices like servers, computers, mobile phones) Software (Applications, operating systems, security tools) Data (User information, business records, encrypted files)
  • 10.
    Hardware Security • Whatis Hardware Security? • Protecting physical devices from theft, damage, or tampering. • Key Threats: Device Theft (Laptops, USB drives, smartphones) Unauthorized Access (Unprotected servers, unencrypted drives) Hardware Failure (Data loss due to malfunction) • Security Measures: Encryption (Encrypt hard drives to prevent unauthorized access) Access Controls (Use biometric authentication, smart cards) Physical Security (Lock servers, use CCTV & access logs)
  • 11.
    Software Security • Whatis Software Security? • Ensuring applications and systems are free from vulnerabilities. • Key Threats: Malware & Viruses (Compromising software integrity) Unpatched Software (Hackers exploit outdated systems) Unauthorized Software Access (Hackers manipulating apps) • Security Measures: Regular Software Updates (Patch vulnerabilities) Firewalls & Antivirus (Prevent malware infections) Application Security Testing (Find and fix bugs)
  • 12.
    What is DataSecurity? • What is Data Security? • Protecting digital information from unauthorized access and corruption. • Key Threats: Data Breaches (Hackers stealing sensitive data) Ransomware Attacks (Encrypting data for ransom) Unauthorized Data Sharing (Leaking private information) • Security Measures: Data Encryption (Protect files at rest and in transit) Access Control (Only authorized users can view/edit data) Regular Backups (Ensure data recovery in case of attacks)
  • 13.
    • Key Threatsto Data Security & Privacy: Loss or Harm Interception Interruption Modification Fabrication
  • 14.
    Loss or Harm •Definition: • Data is lost, deleted, or damaged, making it unusable or irrecoverable. • Causes: Accidental deletion or hardware failure Cyberattacks (ransomware, malware) Physical damage (fire, flood, theft)
  • 15.
    Interception • Definition: • Datais intercepted during transmission by an unauthorized party. • Examples: Man-in-the-Middle (MITM) attacks Packet sniffing on public Wi-Fi
  • 16.
    Interruption • Definition: Disrupts dataavailability or system operations. • Examples: Distributed Denial-of-Service (DDoS) attacks Server crashes or power outages Ransomware locking critical systems
  • 17.
    Modification • Definition: • Unauthorizedalteration of data, affecting its integrity. • Examples: Database tampering Malware modifying financial transactions Unauthorized edits in Electronic Health Records (EHRs)
  • 18.
    Fabrication • Definition: • Fakeor unauthorized data is created, misleading systems or users. • Examples: Fake accounts in banking apps Phishing emails with malicious links Spoofed transactions in financial systems