Information Security
P R ES E N T E D BY:
A L A A M A H M O U D 2 0 1 0 1 3 8 4
A L A A H ES H A M 2 0 1 0 9 4 9 7
Agenda
 Define information security.
Principles of information security.
Examples of sensitive data.
Importance of information security.
Famous Security Threats.
Famous security attacks.
How to protect your system?
Conclusion.
Define Information
Security:
 refer to a processes and methods
used to protect sensitive
information from unauthorized
access , or disruption.
Principles of
Information
security:
 confidentiality.
Integrity.
Availability.
Examples of sensitive
data:
Any kind of data that you don’t want any one to know about:
1- Your facebook account and messages.
2- Health and medical data.
3- Credit cards data in websites (Online payment).
4- Your transactions for online banking.
5- Company’s Employees information.
6- Customer Information for any business.
Importance of information security:
Reducing the risk of data attacks in IT systems.
Reducing
Applying security controls to prevent unauthorized access to sensitive information.
Applying
Preventing disruption of services, e.g., denial-of-service attacks.
Preventing
Keeping downtime to a minimum so productivity stays high.
Keeping
Ensuring business continuity through data protection of information assets.
Ensuring
Providing peace of mind by keeping confidential information safe from security threats.
Providing
Famous Security
Threats:
 Phishing.
 Ransomware.
 Distributed denial of service (DDoS).
Famous security
attacks:
At 2009 Google China attacked by cyber
attack.
At 1999 Teen hacks NASA and US Defense
Department.
At 2012 LinkedIn attacked by Russian
cybercriminals.
At 2018 GITHUB (DDoS) attacked .
How to protect
your system?
Use Antivirus ,Firewalls , anti-
Spyware.
Use Complex Passwords.
Apply penetration tests on your
system to discover issues and fix
them.
Use strong encryption for sensitive
data.
Protect your
System Cont.:
Use trusted websites (like websites SSL)
Control physical access to your computers
and network components.
Train your employees in cyber security
principles.
Regular backups and hire a qualified IT team.
Conclusion:
Information Security is a rapidly growing
topic.
Many famous companies suffered from
security breaches like Yahoo, Linkedin, Github
and Google.
Famous security threats.
Famous security attacks.
How to protect your system?
THANK YOU ANY QUESTIONS

Information security

  • 1.
    Information Security P RES E N T E D BY: A L A A M A H M O U D 2 0 1 0 1 3 8 4 A L A A H ES H A M 2 0 1 0 9 4 9 7
  • 2.
    Agenda  Define informationsecurity. Principles of information security. Examples of sensitive data. Importance of information security. Famous Security Threats. Famous security attacks. How to protect your system? Conclusion.
  • 3.
    Define Information Security:  referto a processes and methods used to protect sensitive information from unauthorized access , or disruption.
  • 4.
  • 5.
    Examples of sensitive data: Anykind of data that you don’t want any one to know about: 1- Your facebook account and messages. 2- Health and medical data. 3- Credit cards data in websites (Online payment). 4- Your transactions for online banking. 5- Company’s Employees information. 6- Customer Information for any business.
  • 6.
    Importance of informationsecurity: Reducing the risk of data attacks in IT systems. Reducing Applying security controls to prevent unauthorized access to sensitive information. Applying Preventing disruption of services, e.g., denial-of-service attacks. Preventing Keeping downtime to a minimum so productivity stays high. Keeping Ensuring business continuity through data protection of information assets. Ensuring Providing peace of mind by keeping confidential information safe from security threats. Providing
  • 7.
    Famous Security Threats:  Phishing. Ransomware.  Distributed denial of service (DDoS).
  • 8.
    Famous security attacks: At 2009Google China attacked by cyber attack. At 1999 Teen hacks NASA and US Defense Department. At 2012 LinkedIn attacked by Russian cybercriminals. At 2018 GITHUB (DDoS) attacked .
  • 9.
    How to protect yoursystem? Use Antivirus ,Firewalls , anti- Spyware. Use Complex Passwords. Apply penetration tests on your system to discover issues and fix them. Use strong encryption for sensitive data.
  • 10.
    Protect your System Cont.: Usetrusted websites (like websites SSL) Control physical access to your computers and network components. Train your employees in cyber security principles. Regular backups and hire a qualified IT team.
  • 11.
    Conclusion: Information Security isa rapidly growing topic. Many famous companies suffered from security breaches like Yahoo, Linkedin, Github and Google. Famous security threats. Famous security attacks. How to protect your system?
  • 12.
    THANK YOU ANYQUESTIONS