SlideShare a Scribd company logo
1 of 15
Security is
everyone’s responsibility
Information
Security
Overview
Ismaila Gassama
Objectives
 What is information security?
 Security goal CIA trial
 Security vulnerabilities threats and attacks
 Challenges to InfoSec
 How do we overcome to these problem
 Consequence of security Breach
Q&A
 Importance of Security
 Security vs safety
 Key Takeaways
Information systems security, more commonly referred to as
INFOSEC, by definition It is a set of business processes that
protects information assets regardless of how the information is
formatted or whether it is being processed, is in transit or is being
stored.
.
What is information security?
Security goal CIA trial
The purpose of computer security is to devise ways to prevent the
weaknesses from being exploited. To understand what preventive
measures make the most sense, we consider what we mean when
we say that a system is “secure.”
Talking About security goal , we are addressing three important
aspects of any computer- related system:
• Confidentiality
• Integrity
• Availability
Security goal CIA trial
• Confidentiality
Ensures that computer related assets are accessed only by
authorized parties.
• Integrity
Safeguard , the accuracy and completeness of information and
processing methods.
• Availability
Ensuring that authorized users have access to associated assets
when required.
Security goal CIA trial
Security Vulnerabilities, Threats and Attacks
Computer-based system has three separate but valuable
components: hardware, software and data. Each of these
assets offers value to different members of the community
affected by the system . we identify weaknesses in the system.
• Vulnerability, anything that leaves information
exposed to threat .
• Attack an action taken against a target with the intention
of doing harm ; it attempts to destroy , alert , disable ,
steal or gain authorized access to or make authorized use
of an asset.
• Threat is a set of circumstances that has the potential
to cause loss or harm.
Security Vulnerabilities, Threats and Attacks
Challenges of security
A number of trends illustrate why security is becoming increasingly
difficult:
 Speed of attacks
 Sophistication of attacks
 Faster detection of weaknesses
 Distributed attacks
 Difficulties of patching
Important of security
• The internet allows an attacker to attack from anywhere on the
planet.
• Risk caused by poor security knowledge and practice:
Identity theft
Monetary theft
Legal Ramifications ( staff and companies)
Termination if organization policies are not followed.
• According to www.SANS.org , the top vulnerabilities available
for cyber criminal are :
Web browser
IM clients
Web application
Excessive User Rights
Security vs Safety
• Security: We must protect our
computers and data in the
same way that we secure the
doors to our homes.
• Safety: We must behave in
ways that protect us against
risks and threats that come
with technology.
• Most of the practices are from the National
Institute of Standards and Technology
• Must use the practices at home and at work to
keep safe and secure (Security awareness).
• Employers should have policies and procedures
regarding secure practices. Be sure to understand
them and adhere to them. It will protect you, your
employer and your customers.
How do we overcome to these problems
Consequence of security Breach
Information security is “organizational problem “rather than
“IT problem “and the Consequence of security breach leads to:
 Reputation loss
Financial loss
Intellectual property loss
 loss Legislation
Loss of customers confidence
Loss of customers confidence
Eventually Loss of good will ……..
Key Takeaways:
• Objective of InfoSec is Confidentiality,
Integrity and Availability protect your systems
and your data
• Security should be applied in layers
• Security Awareness at all levels must be
maintained
• Failure to Secure is an Opportunity to Fail
Questions ?

More Related Content

What's hot

Information security
Information security Information security
Information security AishaIshaq4
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security pptGryffin EJ
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
IT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighIT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighChristina McVeigh
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security pptkaranramani4
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)BPalmer13
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Morakinyo Animasaun
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdfMing Man Chan
 

What's hot (20)

Information security
Information security Information security
Information security
 
Cyber security vs information assurance
Cyber security vs information assuranceCyber security vs information assurance
Cyber security vs information assurance
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
Information security
Information securityInformation security
Information security
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Information security management
Information security managementInformation security management
Information security management
 
IT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighIT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeigh
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Information security
Information securityInformation security
Information security
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Ceh intro
Ceh introCeh intro
Ceh intro
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
IT security
IT securityIT security
IT security
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdf
 

Viewers also liked

IEEE Projects, Non-IEEE Projects, Data Mining, Cloud computing, Main Projects...
IEEE Projects, Non-IEEE Projects, Data Mining, Cloud computing, Main Projects...IEEE Projects, Non-IEEE Projects, Data Mining, Cloud computing, Main Projects...
IEEE Projects, Non-IEEE Projects, Data Mining, Cloud computing, Main Projects...Shakas Technologies
 
Mobile security
Mobile securityMobile security
Mobile securityMphasis
 
Information Security at the Workplace
Information Security at the WorkplaceInformation Security at the Workplace
Information Security at the WorkplaceJohn Macasio
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityJohn Paul Prassanna
 
Amazon Inc Financial Analysis of 2014
Amazon Inc Financial Analysis of 2014Amazon Inc Financial Analysis of 2014
Amazon Inc Financial Analysis of 2014pengqia chen
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Marketing Strategies of Flipkart
Marketing Strategies of Flipkart Marketing Strategies of Flipkart
Marketing Strategies of Flipkart Vicky Singh
 

Viewers also liked (12)

IEEE Projects, Non-IEEE Projects, Data Mining, Cloud computing, Main Projects...
IEEE Projects, Non-IEEE Projects, Data Mining, Cloud computing, Main Projects...IEEE Projects, Non-IEEE Projects, Data Mining, Cloud computing, Main Projects...
IEEE Projects, Non-IEEE Projects, Data Mining, Cloud computing, Main Projects...
 
Mobile security
Mobile securityMobile security
Mobile security
 
Secure cloud mining By ahlam
Secure cloud mining  By ahlamSecure cloud mining  By ahlam
Secure cloud mining By ahlam
 
Information Security at the Workplace
Information Security at the WorkplaceInformation Security at the Workplace
Information Security at the Workplace
 
Cia security model
Cia security modelCia security model
Cia security model
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
 
Amazon Inc Financial Analysis of 2014
Amazon Inc Financial Analysis of 2014Amazon Inc Financial Analysis of 2014
Amazon Inc Financial Analysis of 2014
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Marketing Strategies of Flipkart
Marketing Strategies of Flipkart Marketing Strategies of Flipkart
Marketing Strategies of Flipkart
 

Similar to InfoSec Overview Explains CIA Model

Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAbdullahKanash
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Secninjaz Technologies LLP
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Securityxsy
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxTikdiPatel
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...Precise Testing Solution
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdfpublicchats
 

Similar to InfoSec Overview Explains CIA Model (20)

Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
CS_Tuto.ppt
CS_Tuto.pptCS_Tuto.ppt
CS_Tuto.ppt
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
information security management
information security managementinformation security management
information security management
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
 
I0516064
I0516064I0516064
I0516064
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Overview
OverviewOverview
Overview
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdf
 

InfoSec Overview Explains CIA Model

  • 2. Objectives  What is information security?  Security goal CIA trial  Security vulnerabilities threats and attacks  Challenges to InfoSec  How do we overcome to these problem  Consequence of security Breach Q&A  Importance of Security  Security vs safety  Key Takeaways
  • 3. Information systems security, more commonly referred to as INFOSEC, by definition It is a set of business processes that protects information assets regardless of how the information is formatted or whether it is being processed, is in transit or is being stored. . What is information security?
  • 4. Security goal CIA trial The purpose of computer security is to devise ways to prevent the weaknesses from being exploited. To understand what preventive measures make the most sense, we consider what we mean when we say that a system is “secure.” Talking About security goal , we are addressing three important aspects of any computer- related system: • Confidentiality • Integrity • Availability
  • 5. Security goal CIA trial • Confidentiality Ensures that computer related assets are accessed only by authorized parties. • Integrity Safeguard , the accuracy and completeness of information and processing methods. • Availability Ensuring that authorized users have access to associated assets when required.
  • 7. Security Vulnerabilities, Threats and Attacks Computer-based system has three separate but valuable components: hardware, software and data. Each of these assets offers value to different members of the community affected by the system . we identify weaknesses in the system. • Vulnerability, anything that leaves information exposed to threat .
  • 8. • Attack an action taken against a target with the intention of doing harm ; it attempts to destroy , alert , disable , steal or gain authorized access to or make authorized use of an asset. • Threat is a set of circumstances that has the potential to cause loss or harm. Security Vulnerabilities, Threats and Attacks
  • 9. Challenges of security A number of trends illustrate why security is becoming increasingly difficult:  Speed of attacks  Sophistication of attacks  Faster detection of weaknesses  Distributed attacks  Difficulties of patching
  • 10. Important of security • The internet allows an attacker to attack from anywhere on the planet. • Risk caused by poor security knowledge and practice: Identity theft Monetary theft Legal Ramifications ( staff and companies) Termination if organization policies are not followed. • According to www.SANS.org , the top vulnerabilities available for cyber criminal are : Web browser IM clients Web application Excessive User Rights
  • 11. Security vs Safety • Security: We must protect our computers and data in the same way that we secure the doors to our homes. • Safety: We must behave in ways that protect us against risks and threats that come with technology.
  • 12. • Most of the practices are from the National Institute of Standards and Technology • Must use the practices at home and at work to keep safe and secure (Security awareness). • Employers should have policies and procedures regarding secure practices. Be sure to understand them and adhere to them. It will protect you, your employer and your customers. How do we overcome to these problems
  • 13. Consequence of security Breach Information security is “organizational problem “rather than “IT problem “and the Consequence of security breach leads to:  Reputation loss Financial loss Intellectual property loss  loss Legislation Loss of customers confidence Loss of customers confidence Eventually Loss of good will ……..
  • 14. Key Takeaways: • Objective of InfoSec is Confidentiality, Integrity and Availability protect your systems and your data • Security should be applied in layers • Security Awareness at all levels must be maintained • Failure to Secure is an Opportunity to Fail