SlideShare a Scribd company logo
WELCOME
WHATIS INFORMATIONSECURITY?
The protection of information and its
elements including systems, hardware that
use, store and transmit the information
SECURITYTYPES
• Physical Security : To protect Physical items, objects or areas
• Personal Security : To protect the individual or group of individuals who are authorized
• Operations Security : To protect the details of a particular operation or activities
• Communications Security : To protect communication media, technology and content
• Network Security :To protect networking components, connections and contents
• Information Security : To protect information assets
THREATSTOINFORMATIONSYSTEM
 There are many information security threats that
we need to be constantly aware of and protect
against in order to ensure our sensitive
information remains secure. Some of the threats
are as follows:
UNAUTHORIZEDACCESS–
• The attempted or successful access of information or systems,
without permission or rights to do so.
 Ensure you have a properly configured firewall, up to date
malware prevention software and all software has the latest
security updates.
 Protect all sensitive information, utilizing encryption where
appropriate, and use strong passwords that are changed
regularly.
CYBERESPIONAGE
• The act of spying through the use of computers, involving the
covert access or ‘hacking’of company or government networks
to obtain sensitive information.
 Be alert for social engineering attempts and
verify all requests for sensitive information.
 Ensure software has the latest security updates, your network
is secure and monitor for unusual network behavior.
MALWARE
• A collective term for malicious software, such as viruses,
worms and trojans; designed to infiltrate systems and
information for criminal, commercial or destructive purposes.
 Ensure you have a properly configured firewall, up to date
malware prevention and all software has the latest security
updates.
 Do not click links or open attachments in emails from
unknown senders, visit un-trusted websites or install dubious
software.
DATALEAKAGE
• The intentional or accidental loss, theft or exposure of
sensitive company or personal information
 Ensure all sensitive information stored on removable
storage media, mobile devices or laptops is encrypted
 Be mindful of what you post online, check email recipients
before pressing send, and never email sensitive company
information to personal email accounts
MOBILEDEVICEATTACK
• The malicious attack on, or unauthorized access of mobile
devices and the information stored or processed by them;
performed wirelessly or through physical possession.
 Keep devices with you at all times, encrypt all sensitive data
and removable storage media, and use strong passwords.
 Avoid connecting to insecure, un-trusted public wireless
networks and ensure Bluetooth is in ‘undiscoverable’mode.
SOCIALENGINEERING
• Tricking and manipulating others by phone, email, online or in-
person, into divulging sensitive information, in order to access
company information or systems.
 Verify all requests for sensitive information, no matter how
legitimate they may seem, and never share your passwords with
anyone – not even the helpdesk.
 Never part with sensitive information if in doubt, and report
suspected social engineering attempts immediately.
INSIDERS
• An employee or worker with malicious intent to steal
sensitive company information, commit fraud or cause
damage to company systems or information
 Ensure access to sensitive information is restricted to only
those that need it and revoke access when no longer
required
 Report all suspicious activity or workers immediately
PHISHING
• A form of social engineering, involving the sending of legitimate
looking emails aimed at fraudulently extracting sensitive information
from recipients, usually to gain access to systems or for identity theft.
• Look out for emails containing unexpected or unsolicited requests for
sensitive information, or contextually relevant emails from unknown
senders.
• Never click on suspicious looking links within emails, and report all
suspected phishing attempts immediately.
SPAM
• Unsolicited email sent in bulk to many individuals, usually
for commercial gain, but increasingly for spreading
malware.
 Only give your email to those you trust and never post
your address online for others to view.
 Use a spam filter and never reply to spam emails or click
links within them.
IDENTITYTHEFT
• The theft of an unknowing individual’s personal information, in order
to fraudulently assume that individual’s identity to commit a crime,
usually for financial gain.
• Never provide personal information to un-trusted individuals or
websites.
• Ensure personal information is protected when stored and securely
disposed of when no longer needed.
PROTECTINGINFORMATIONSYSTEM
1. Data security is fundamental
Data security is crucial to all academic, medical and
business operations.
 All existing and new business and data processes should
include a data security review to be sure data is safe from
loss and secured against unauthorized access.
2. Plan ahead
Create a plan to review your data security status and
policies and create routine processes to access, handle and
store the data safely as well as archive unneeded data.
 Make sure you and your colleagues know how to respond if
you have a data loss or data breach incident.
3. Know what data you have
The first step to secure computing is knowing what data you
have and what levels of protection are required to keep the
data both confidential and safe from loss.
4. Scale down the data
Keep only the data you need for routine current business,
safely archive or destroy older data, and remove it from all
computers and other devices (smart phones, laptops, flash
drives, external hard disks).
5. Lock up!
 Physical security is the key to safe and confidential computing.
 All the passwords in the world won't get your laptop back if the
computer itself is stolen.
 Back up the data to a safe place in the event of loss.
INFORMATIONSECURITYCONTROLS
Security is generally defined as the freedom from danger or
as the condition of safety.
 Computer security, specifically, is the protection of data in a
system against unauthorized disclosure, modification, or
destruction and protection of the computer system itself
against unauthorized use, modification, or denial of service.
PHYSICALCONTROLS
It is the use of locks, security guards, badges, alarms, and similar
measures to control access to computers, related equipment
(including utilities), and the processing facility itself.
In addition, measures are required for protecting computers,
related equipment, and their contents from espionage, theft, and
destruction or damage by accident, fire, or natural disaster (e.g.,
floods and earthquakes).
TECHNICALCONTROLS
Involves the use of safeguards incorporated in computer
hardware, operations or applications software,
communications hardware and software, and related devices.
 Technical controls are sometimes referred to as logical
controls.
TECHNICALCONTROLS
Preventive technical controls are used to prevent
unauthorized personnel or programs from gaining remote
access to computing resources. Examples of these controls
include:
o Access control software
o Antivirus software
o Library control systems
o Passwords
o Smart cards
o Encryption
o Dial-up access control and callback systems
ADMINISTRATIVECONTROLS
Consists of management constraints, operational
procedures, accountability procedures, and supplemental
administrative controls established to provide an acceptable
level of protection for computing resources.
 In addition, administrative controls include procedures
established to ensure that all personnel who have access to
computing resources have the required authorizations and
appropriate security clearances.
ADMINISTRATIVECONTROLS
 Preventive administrative controls are personnel-oriented techniques
for controlling people’s behavior to ensure the confidentiality,
integrity, and availability of computing data and programs. Examples
of preventive administrative controls include:
o Security awareness and technical training
o Separation of duties
o Procedures for recruiting and terminating employees
o Security policies and procedures
o Supervision.
o Disaster recovery, contingency, and emergency plans
o User registration for computer access
THANK YOU

More Related Content

What's hot

information security
information securityinformation security
information security
university of karachi
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
Information security
Information securityInformation security
Information security
linalona515
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
Faheem Ul Hasan
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
MohammedYaseen638128
 
information security management
information security managementinformation security management
information security management
Gurpreetkaur838
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
lavakumar Thatisetti
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan
 
Security policy
Security policySecurity policy
Security policy
Dhani Ahmad
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
Mukund Kumar Bharti
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
Yasir Nafees
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
Happiest Minds Technologies
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
DallasHaselhorst
 
Physical security
Physical securityPhysical security
Physical security
Tariq Mahmood
 

What's hot (20)

information security
information securityinformation security
information security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Data security
Data securityData security
Data security
 
Information security
Information securityInformation security
Information security
 
Security threats
Security threatsSecurity threats
Security threats
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
information security management
information security managementinformation security management
information security management
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Security policy
Security policySecurity policy
Security policy
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Physical security
Physical securityPhysical security
Physical security
 

Viewers also liked

INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dr. Loganathan R
 
Information Systems Security: An Overview
Information Systems Security: An OverviewInformation Systems Security: An Overview
Information Systems Security: An Overview
Apostolos Syropoulos
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
DUTIES OF HUMAN RESOURCE MANAGERS
DUTIES OF HUMAN RESOURCE MANAGERSDUTIES OF HUMAN RESOURCE MANAGERS
DUTIES OF HUMAN RESOURCE MANAGERS
ANAND MURALI
 
HUMAN RESOURCE INFORMATION SYSTEM (HRIS)
HUMAN RESOURCE INFORMATION SYSTEM (HRIS)HUMAN RESOURCE INFORMATION SYSTEM (HRIS)
HUMAN RESOURCE INFORMATION SYSTEM (HRIS)
ANAND MURALI
 
PPT FOR SECURITY
PPT FOR SECURITYPPT FOR SECURITY
PPT FOR SECURITY
Aaditya Vyas
 
Seo services facts
Seo services factsSeo services facts
Seo services facts
vikashony
 
teknologi sistem komputer
teknologi sistem komputerteknologi sistem komputer
teknologi sistem komputerSignorina Cuore
 
System Security
System SecuritySystem Security
System Security
Reddhi Basu
 
Wifi Technology
Wifi TechnologyWifi Technology
Wifi Technology
Pak Cik Nan
 
Information System Security - Prinsip Manajemen Keamanan
Information System Security - Prinsip Manajemen KeamananInformation System Security - Prinsip Manajemen Keamanan
Information System Security - Prinsip Manajemen Keamanan
Dudy Ali
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
OpenDNS
 
An Overview of Social Media
An Overview of Social MediaAn Overview of Social Media
An Overview of Social Media
Apostolos Syropoulos
 
Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System SecurityKiran Munir
 
Distributed Operating System_3
Distributed Operating System_3Distributed Operating System_3
Distributed Operating System_3
Dr Sandeep Kumar Poonia
 
Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's Algorithm
Nikita Kasar
 
Fuzzy Topological Systems
Fuzzy Topological SystemsFuzzy Topological Systems
Fuzzy Topological Systems
Apostolos Syropoulos
 
Shamir Secret Sharing Presentation
Shamir Secret Sharing PresentationShamir Secret Sharing Presentation
Shamir Secret Sharing PresentationKaliel Williamson
 

Viewers also liked (20)

INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Information Systems Security: An Overview
Information Systems Security: An OverviewInformation Systems Security: An Overview
Information Systems Security: An Overview
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
DUTIES OF HUMAN RESOURCE MANAGERS
DUTIES OF HUMAN RESOURCE MANAGERSDUTIES OF HUMAN RESOURCE MANAGERS
DUTIES OF HUMAN RESOURCE MANAGERS
 
HUMAN RESOURCE INFORMATION SYSTEM (HRIS)
HUMAN RESOURCE INFORMATION SYSTEM (HRIS)HUMAN RESOURCE INFORMATION SYSTEM (HRIS)
HUMAN RESOURCE INFORMATION SYSTEM (HRIS)
 
PPT FOR SECURITY
PPT FOR SECURITYPPT FOR SECURITY
PPT FOR SECURITY
 
Seo services facts
Seo services factsSeo services facts
Seo services facts
 
teknologi sistem komputer
teknologi sistem komputerteknologi sistem komputer
teknologi sistem komputer
 
System Security
System SecuritySystem Security
System Security
 
Wifi Technology
Wifi TechnologyWifi Technology
Wifi Technology
 
Information System Security - Prinsip Manajemen Keamanan
Information System Security - Prinsip Manajemen KeamananInformation System Security - Prinsip Manajemen Keamanan
Information System Security - Prinsip Manajemen Keamanan
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
 
An Overview of Social Media
An Overview of Social MediaAn Overview of Social Media
An Overview of Social Media
 
Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System Security
 
Distributed Operating System_3
Distributed Operating System_3Distributed Operating System_3
Distributed Operating System_3
 
Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's Algorithm
 
Fuzzy Topological Systems
Fuzzy Topological SystemsFuzzy Topological Systems
Fuzzy Topological Systems
 
Secret Sharing Cs416
Secret Sharing Cs416Secret Sharing Cs416
Secret Sharing Cs416
 
Shamir Secret Sharing Presentation
Shamir Secret Sharing PresentationShamir Secret Sharing Presentation
Shamir Secret Sharing Presentation
 

Similar to INFORMATION SECURITY SYSTEM

InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
Haseeb Ahmed Awan
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
maqib8373
 
Information Security
Information Security Information Security
Information Security
Dio Pratama
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
 
Information Security Bachelor in Information technology unit 1
Information Security Bachelor in Information technology unit 1Information Security Bachelor in Information technology unit 1
Information Security Bachelor in Information technology unit 1
ssuserf35ac9
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
Kirti Verma
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
Kimarie Brown
 
Computer security
Computer securityComputer security
Computer security
RoshanMaharjan13
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
David Menken
 
IS Unit II.pptx
IS Unit II.pptxIS Unit II.pptx
IS Unit II.pptx
LAVANYAsrietacin
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
nazar60
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
презентация1
презентация1презентация1
презентация1
sagidullaa01
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
Mis
MisMis
Mis
misecho
 

Similar to INFORMATION SECURITY SYSTEM (20)

InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
 
Information Security
Information Security Information Security
Information Security
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Information Security Bachelor in Information technology unit 1
Information Security Bachelor in Information technology unit 1Information Security Bachelor in Information technology unit 1
Information Security Bachelor in Information technology unit 1
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
Computer security
Computer securityComputer security
Computer security
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
IS Unit II.pptx
IS Unit II.pptxIS Unit II.pptx
IS Unit II.pptx
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
презентация1
презентация1презентация1
презентация1
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Mis
MisMis
Mis
 

Recently uploaded

The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 

Recently uploaded (20)

The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 

INFORMATION SECURITY SYSTEM

  • 2.
  • 3. WHATIS INFORMATIONSECURITY? The protection of information and its elements including systems, hardware that use, store and transmit the information
  • 4. SECURITYTYPES • Physical Security : To protect Physical items, objects or areas • Personal Security : To protect the individual or group of individuals who are authorized • Operations Security : To protect the details of a particular operation or activities • Communications Security : To protect communication media, technology and content • Network Security :To protect networking components, connections and contents • Information Security : To protect information assets
  • 5. THREATSTOINFORMATIONSYSTEM  There are many information security threats that we need to be constantly aware of and protect against in order to ensure our sensitive information remains secure. Some of the threats are as follows:
  • 6. UNAUTHORIZEDACCESS– • The attempted or successful access of information or systems, without permission or rights to do so.  Ensure you have a properly configured firewall, up to date malware prevention software and all software has the latest security updates.  Protect all sensitive information, utilizing encryption where appropriate, and use strong passwords that are changed regularly.
  • 7. CYBERESPIONAGE • The act of spying through the use of computers, involving the covert access or ‘hacking’of company or government networks to obtain sensitive information.  Be alert for social engineering attempts and verify all requests for sensitive information.  Ensure software has the latest security updates, your network is secure and monitor for unusual network behavior.
  • 8. MALWARE • A collective term for malicious software, such as viruses, worms and trojans; designed to infiltrate systems and information for criminal, commercial or destructive purposes.  Ensure you have a properly configured firewall, up to date malware prevention and all software has the latest security updates.  Do not click links or open attachments in emails from unknown senders, visit un-trusted websites or install dubious software.
  • 9. DATALEAKAGE • The intentional or accidental loss, theft or exposure of sensitive company or personal information  Ensure all sensitive information stored on removable storage media, mobile devices or laptops is encrypted  Be mindful of what you post online, check email recipients before pressing send, and never email sensitive company information to personal email accounts
  • 10. MOBILEDEVICEATTACK • The malicious attack on, or unauthorized access of mobile devices and the information stored or processed by them; performed wirelessly or through physical possession.  Keep devices with you at all times, encrypt all sensitive data and removable storage media, and use strong passwords.  Avoid connecting to insecure, un-trusted public wireless networks and ensure Bluetooth is in ‘undiscoverable’mode.
  • 11. SOCIALENGINEERING • Tricking and manipulating others by phone, email, online or in- person, into divulging sensitive information, in order to access company information or systems.  Verify all requests for sensitive information, no matter how legitimate they may seem, and never share your passwords with anyone – not even the helpdesk.  Never part with sensitive information if in doubt, and report suspected social engineering attempts immediately.
  • 12. INSIDERS • An employee or worker with malicious intent to steal sensitive company information, commit fraud or cause damage to company systems or information  Ensure access to sensitive information is restricted to only those that need it and revoke access when no longer required  Report all suspicious activity or workers immediately
  • 13. PHISHING • A form of social engineering, involving the sending of legitimate looking emails aimed at fraudulently extracting sensitive information from recipients, usually to gain access to systems or for identity theft. • Look out for emails containing unexpected or unsolicited requests for sensitive information, or contextually relevant emails from unknown senders. • Never click on suspicious looking links within emails, and report all suspected phishing attempts immediately.
  • 14. SPAM • Unsolicited email sent in bulk to many individuals, usually for commercial gain, but increasingly for spreading malware.  Only give your email to those you trust and never post your address online for others to view.  Use a spam filter and never reply to spam emails or click links within them.
  • 15. IDENTITYTHEFT • The theft of an unknowing individual’s personal information, in order to fraudulently assume that individual’s identity to commit a crime, usually for financial gain. • Never provide personal information to un-trusted individuals or websites. • Ensure personal information is protected when stored and securely disposed of when no longer needed.
  • 16. PROTECTINGINFORMATIONSYSTEM 1. Data security is fundamental Data security is crucial to all academic, medical and business operations.  All existing and new business and data processes should include a data security review to be sure data is safe from loss and secured against unauthorized access.
  • 17. 2. Plan ahead Create a plan to review your data security status and policies and create routine processes to access, handle and store the data safely as well as archive unneeded data.  Make sure you and your colleagues know how to respond if you have a data loss or data breach incident.
  • 18. 3. Know what data you have The first step to secure computing is knowing what data you have and what levels of protection are required to keep the data both confidential and safe from loss.
  • 19. 4. Scale down the data Keep only the data you need for routine current business, safely archive or destroy older data, and remove it from all computers and other devices (smart phones, laptops, flash drives, external hard disks).
  • 20. 5. Lock up!  Physical security is the key to safe and confidential computing.  All the passwords in the world won't get your laptop back if the computer itself is stolen.  Back up the data to a safe place in the event of loss.
  • 21. INFORMATIONSECURITYCONTROLS Security is generally defined as the freedom from danger or as the condition of safety.  Computer security, specifically, is the protection of data in a system against unauthorized disclosure, modification, or destruction and protection of the computer system itself against unauthorized use, modification, or denial of service.
  • 22. PHYSICALCONTROLS It is the use of locks, security guards, badges, alarms, and similar measures to control access to computers, related equipment (including utilities), and the processing facility itself. In addition, measures are required for protecting computers, related equipment, and their contents from espionage, theft, and destruction or damage by accident, fire, or natural disaster (e.g., floods and earthquakes).
  • 23. TECHNICALCONTROLS Involves the use of safeguards incorporated in computer hardware, operations or applications software, communications hardware and software, and related devices.  Technical controls are sometimes referred to as logical controls.
  • 24. TECHNICALCONTROLS Preventive technical controls are used to prevent unauthorized personnel or programs from gaining remote access to computing resources. Examples of these controls include: o Access control software o Antivirus software o Library control systems o Passwords o Smart cards o Encryption o Dial-up access control and callback systems
  • 25. ADMINISTRATIVECONTROLS Consists of management constraints, operational procedures, accountability procedures, and supplemental administrative controls established to provide an acceptable level of protection for computing resources.  In addition, administrative controls include procedures established to ensure that all personnel who have access to computing resources have the required authorizations and appropriate security clearances.
  • 26. ADMINISTRATIVECONTROLS  Preventive administrative controls are personnel-oriented techniques for controlling people’s behavior to ensure the confidentiality, integrity, and availability of computing data and programs. Examples of preventive administrative controls include: o Security awareness and technical training o Separation of duties o Procedures for recruiting and terminating employees o Security policies and procedures o Supervision. o Disaster recovery, contingency, and emergency plans o User registration for computer access