SlideShare a Scribd company logo
Security is
everyone’s responsibility
Information
Security
Overview
Ismaila Gassama
Objectives
 What is information security?
 Security goal CIA trial
 Security vulnerabilities threats and attacks
 Challenges to InfoSec
 How do we overcome to these problem
 Consequence of security Breach
Q&A
 Importance of Security
 Security vs safety
 Key Takeaways
Information systems security, more commonly referred to as
INFOSEC, by definition It is a set of business processes that
protects information assets regardless of how the information is
formatted or whether it is being processed, is in transit or is being
stored.
.
What is information security?
Security goal CIA trial
The purpose of computer security is to devise ways to prevent the
weaknesses from being exploited. To understand what preventive
measures make the most sense, we consider what we mean when
we say that a system is “secure.”
Talking About security goal , we are addressing three important
aspects of any computer- related system:
• Confidentiality
• Integrity
• Availability
Security goal CIA trial
• Confidentiality
Ensures that computer related assets are accessed only by
authorized parties.
• Integrity
Safeguard , the accuracy and completeness of information and
processing methods.
• Availability
Ensuring that authorized users have access to associated assets
when required.
Security goal CIA trial
Security Vulnerabilities, Threats and Attacks
Computer-based system has three separate but valuable
components: hardware, software and data. Each of these
assets offers value to different members of the community
affected by the system . we identify weaknesses in the system.
• Vulnerability, anything that leaves information
exposed to threat .
• Attack an action taken against a target with the intention
of doing harm ; it attempts to destroy , alert , disable ,
steal or gain authorized access to or make authorized use
of an asset.
• Threat is a set of circumstances that has the potential
to cause loss or harm.
Security Vulnerabilities, Threats and Attacks
Challenges of security
A number of trends illustrate why security is becoming increasingly
difficult:
 Speed of attacks
 Sophistication of attacks
 Faster detection of weaknesses
 Distributed attacks
 Difficulties of patching
Important of security
• The internet allows an attacker to attack from anywhere on the
planet.
• Risk caused by poor security knowledge and practice:
Identity theft
Monetary theft
Legal Ramifications ( staff and companies)
Termination if organization policies are not followed.
• According to www.SANS.org , the top vulnerabilities available
for cyber criminal are :
Web browser
IM clients
Web application
Excessive User Rights
Security vs Safety
• Security: We must protect our
computers and data in the
same way that we secure the
doors to our homes.
• Safety: We must behave in
ways that protect us against
risks and threats that come
with technology.
• Most of the practices are from the National
Institute of Standards and Technology
• Must use the practices at home and at work to
keep safe and secure (Security awareness).
• Employers should have policies and procedures
regarding secure practices. Be sure to understand
them and adhere to them. It will protect you, your
employer and your customers.
How do we overcome to these problems
Consequence of security Breach
Information security is “organizational problem “rather than
“IT problem “and the Consequence of security breach leads to:
 Reputation loss
Financial loss
Intellectual property loss
 loss Legislation
Loss of customers confidence
Loss of customers confidence
Eventually Loss of good will ……..
Key Takeaways:
• Objective of InfoSec is Confidentiality,
Integrity and Availability protect your systems
and your data
• Security should be applied in layers
• Security Awareness at all levels must be
maintained
• Failure to Secure is an Opportunity to Fail
Questions ?

More Related Content

What's hot

Information security
Information security Information security
Information security
AishaIshaq4
 
Cyber security vs information assurance
Cyber security vs information assuranceCyber security vs information assurance
Cyber security vs information assurance
Vaughan Olufemi ACIB, AICEN, ANIM
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
Toño Herrera
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Kumawat Dharmpal
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
Gryffin EJ
 
Information security
Information securityInformation security
Information security
avinashbalakrishnan2
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
Cyber Security Infotech
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
IT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighIT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighChristina McVeigh
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
karanramani4
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Ceh intro
Ceh introCeh intro
Ceh intro
Animesh Roy
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
BPalmer13
 
IT security
IT securityIT security
IT security
Aman Jain
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Morakinyo Animasaun
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdf
Ming Man Chan
 

What's hot (20)

Information security
Information security Information security
Information security
 
Cyber security vs information assurance
Cyber security vs information assuranceCyber security vs information assurance
Cyber security vs information assurance
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
Information security
Information securityInformation security
Information security
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Information security management
Information security managementInformation security management
Information security management
 
IT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighIT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeigh
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Information security
Information securityInformation security
Information security
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Ceh intro
Ceh introCeh intro
Ceh intro
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
IT security
IT securityIT security
IT security
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdf
 

Viewers also liked

Usability ≠ Accessibility. An intro to web accessibility for agencies.
Usability ≠ Accessibility. An intro to web accessibility for agencies.Usability ≠ Accessibility. An intro to web accessibility for agencies.
Usability ≠ Accessibility. An intro to web accessibility for agencies.
Kate Horowitz
 
Moodle security
Moodle securityMoodle security
Moodle security
Dilum Bandara
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Yulian Slobodyan
 
1 security goals
1   security goals1   security goals
1 security goalsdrewz lin
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
Khawar Nehal khawar.nehal@atrc.net.pk
 
Evaluating the Quality of Software in ERP Systems Using the ISO 9126 Model
Evaluating the Quality of Software in ERP Systems Using the ISO 9126 Model Evaluating the Quality of Software in ERP Systems Using the ISO 9126 Model
Evaluating the Quality of Software in ERP Systems Using the ISO 9126 Model
ijasa
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
Bharath Rao
 
Unit 8 software quality and matrices
Unit 8 software quality and matricesUnit 8 software quality and matrices
Unit 8 software quality and matrices
Preeti Mishra
 
Computer software form 4
Computer software form 4Computer software form 4
Computer software form 4norhaslinamj
 
PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE Kak Yong
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
travellingpolander
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff
 
Usability vs. User Experience: What's the difference?
Usability vs. User Experience: What's the difference?Usability vs. User Experience: What's the difference?
Usability vs. User Experience: What's the difference?
Domain7
 

Viewers also liked (13)

Usability ≠ Accessibility. An intro to web accessibility for agencies.
Usability ≠ Accessibility. An intro to web accessibility for agencies.Usability ≠ Accessibility. An intro to web accessibility for agencies.
Usability ≠ Accessibility. An intro to web accessibility for agencies.
 
Moodle security
Moodle securityMoodle security
Moodle security
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?
 
1 security goals
1   security goals1   security goals
1 security goals
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Evaluating the Quality of Software in ERP Systems Using the ISO 9126 Model
Evaluating the Quality of Software in ERP Systems Using the ISO 9126 Model Evaluating the Quality of Software in ERP Systems Using the ISO 9126 Model
Evaluating the Quality of Software in ERP Systems Using the ISO 9126 Model
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
Unit 8 software quality and matrices
Unit 8 software quality and matricesUnit 8 software quality and matrices
Unit 8 software quality and matrices
 
Computer software form 4
Computer software form 4Computer software form 4
Computer software form 4
 
PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY AND OPEN SOURCE SOFTWARE
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Usability vs. User Experience: What's the difference?
Usability vs. User Experience: What's the difference?Usability vs. User Experience: What's the difference?
Usability vs. User Experience: What's the difference?
 

Similar to Infosec

Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
AbdullahKanash
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Secninjaz Technologies LLP
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
Meg Weber
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
xsy
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
maqib8373
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
Infosectrain3
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
jondon17
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
CS_Tuto.ppt
CS_Tuto.pptCS_Tuto.ppt
CS_Tuto.ppt
karthikvcyber
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
TikdiPatel
 
information security management
information security managementinformation security management
information security management
Gurpreetkaur838
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
BilalMehmood44
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
Precise Testing Solution
 
I0516064
I0516064I0516064
I0516064
IOSR Journals
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
Jazmine Brown
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
Skippedltd
 

Similar to Infosec (20)

Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
CS_Tuto.ppt
CS_Tuto.pptCS_Tuto.ppt
CS_Tuto.ppt
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
information security management
information security managementinformation security management
information security management
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
 
I0516064
I0516064I0516064
I0516064
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Overview
OverviewOverview
Overview
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 

Infosec

  • 2. Objectives  What is information security?  Security goal CIA trial  Security vulnerabilities threats and attacks  Challenges to InfoSec  How do we overcome to these problem  Consequence of security Breach Q&A  Importance of Security  Security vs safety  Key Takeaways
  • 3. Information systems security, more commonly referred to as INFOSEC, by definition It is a set of business processes that protects information assets regardless of how the information is formatted or whether it is being processed, is in transit or is being stored. . What is information security?
  • 4. Security goal CIA trial The purpose of computer security is to devise ways to prevent the weaknesses from being exploited. To understand what preventive measures make the most sense, we consider what we mean when we say that a system is “secure.” Talking About security goal , we are addressing three important aspects of any computer- related system: • Confidentiality • Integrity • Availability
  • 5. Security goal CIA trial • Confidentiality Ensures that computer related assets are accessed only by authorized parties. • Integrity Safeguard , the accuracy and completeness of information and processing methods. • Availability Ensuring that authorized users have access to associated assets when required.
  • 7. Security Vulnerabilities, Threats and Attacks Computer-based system has three separate but valuable components: hardware, software and data. Each of these assets offers value to different members of the community affected by the system . we identify weaknesses in the system. • Vulnerability, anything that leaves information exposed to threat .
  • 8. • Attack an action taken against a target with the intention of doing harm ; it attempts to destroy , alert , disable , steal or gain authorized access to or make authorized use of an asset. • Threat is a set of circumstances that has the potential to cause loss or harm. Security Vulnerabilities, Threats and Attacks
  • 9. Challenges of security A number of trends illustrate why security is becoming increasingly difficult:  Speed of attacks  Sophistication of attacks  Faster detection of weaknesses  Distributed attacks  Difficulties of patching
  • 10. Important of security • The internet allows an attacker to attack from anywhere on the planet. • Risk caused by poor security knowledge and practice: Identity theft Monetary theft Legal Ramifications ( staff and companies) Termination if organization policies are not followed. • According to www.SANS.org , the top vulnerabilities available for cyber criminal are : Web browser IM clients Web application Excessive User Rights
  • 11. Security vs Safety • Security: We must protect our computers and data in the same way that we secure the doors to our homes. • Safety: We must behave in ways that protect us against risks and threats that come with technology.
  • 12. • Most of the practices are from the National Institute of Standards and Technology • Must use the practices at home and at work to keep safe and secure (Security awareness). • Employers should have policies and procedures regarding secure practices. Be sure to understand them and adhere to them. It will protect you, your employer and your customers. How do we overcome to these problems
  • 13. Consequence of security Breach Information security is “organizational problem “rather than “IT problem “and the Consequence of security breach leads to:  Reputation loss Financial loss Intellectual property loss  loss Legislation Loss of customers confidence Loss of customers confidence Eventually Loss of good will ……..
  • 14. Key Takeaways: • Objective of InfoSec is Confidentiality, Integrity and Availability protect your systems and your data • Security should be applied in layers • Security Awareness at all levels must be maintained • Failure to Secure is an Opportunity to Fail