SlideShare a Scribd company logo
1 of 18
IT SECURITY
OR
INFORMATION
SECURITY
 WHAT IS INFORMATION?
 WHAT IS THE RISK RELATED TO INFORMATION?
 WHAT IS INFORMATION SECURITY?
INFORMATION IS AN ASSET WHICH, LIKE OTHER
IMPORTANT BUSINESS ASSETS, HAS VALUE TO
AN ORGANIZATION AND CONSEQUENTLY NEEDS
TO BE SUITABLY PROTECTED.
INFORMATION CAN BE : -
 CREATED
 STORED
 DESTROYED
 PROCESSED
 TRANSMITTED
 USED
 CORRUPTED
 LOST
 STOLEN
WHAT IS INFORMATION SECURITY?
THE QUALITY OR STATE OF BEING SECURE TO BE FREE FROM DANGER.
SECURITY IS RECOGNIZED AS ESSENTIAL TO PROTECT VITAL PROCESSES AND
THE SYSTEMS THAT PROVIDE THOSE PROCESSES.
SECURITY IS ACHIEVED USING SEVERAL STRATEGIES.
SECURITY BREACHES LEADS TO : -
• REPUTATION LOSS
• FINANCIAL LOSS
• INTELLECTUAL PROPERTY LOSS
• LEGISLATIVE BREACHES LEADING TO LEGAL ACTIONS (CYBER LAW)
• LOSS OF CUSTOMER CONFIDENCE
• BUSINESS INTERRUPTION COSTS
• LOSS OF GOODWILL
PEOPLE WHO USE OR INTERACT WITH THE
INFORMATION INCLUDE:
 SHARE HOLDERS / OWNERS
 MANAGEMENT
 EMPLOYEES
 BUSINESS PARTNERS
 SERVICE PROVIDERS
 CONTRACTORS
 CUSTOMERS / CLIENTS
WHAT CAN WE DO TO
IMPROVE
INFORMATION SECURITY??
PHYSICAL SECURITY COMPONENTS:
 CCTV CAMERAS
 CLOCK IN SYSTEMS / BIOMETRICS
 ENVIRONMENTAL MANAGEMENT SYSTEMS: HUMIDITY CONTROL,
VENTILATION , AIR CONDITIONING, FIRE CONTROL SYSTEMS
 ELECTRICITY / POWER BACKUP
ACCESS TO DEVICES:
o DESKTOP COMPUTERS
o LAPTOPS, ULTRA-MOBILE LAPTOPS
o DIGITAL CAMERAS, PRINTERS, SCANNERS, PHOTOCOPIER ETC.
PASSWORD GUIDELINES : -
DO’S
 ALWAYS USE AT LEAST8 CHARACTER PASSWORD WITH COMBINATION OF
ALPHABETS, NUMBERS AND SPECIAL CHARACTERS (*, %, @, #, $, ^)
 USE PASSWORDS THAT CAN BE EASILY REMEMBERED BY YOU
 CHANGE PASSWORD REGULARLY AS PER POLICY
 USE PASSWORD THAT IS SIGNIFICANTLY DIFFERENT FROM EARLIER PASSWORDS
DON’T’S
 USE PASSWORDS WHICH REVEALS YOUR PERSONAL
INFORMATION OR WORDS FOUND IN DICTIONARY
 WRITE DOWN OR STORE PASSWORDS
 SHARE PASSWORDS OVER PHONE OR EMAIL
 USE PASSWORDS WHICH DO NOT MATCH ABOVE COMPLEXITY CRITERIA
INTERNET USAGE : -
USE INTERNET FOR BUSINESS PURPOSE ONLY
 DO NOT ACCESS INTERNET THROUGH DIAL-UP CONNECTIVITY
 DO NOT USE INTERNET FOR VIEWING, STORINGOR TRANSMITTING OBSCENE OR
PORNOGRAPHIC MATERIAL
 DO NOT USE INTERNET FOR ACCESSING AUCTION SITES
 DO NOT USE INTERNET FOR HACKING OTHER COMPUTER SYSTEMS
 DO NOT USE INTERNET TO DOWNLOAD / UPLOAD COMMERCIAL SOFTWARE /
COPYRIGHTED MATERIAL
E-MAIL USAGE : -
DO’S
USE OFFICIAL MAIL FOR BUSINESS PURPOSES ONLY
FOLLOW THE MAIL STORAGE GUIDELINES TO AVOID BLOCKING OF E-MAILS
 IF YOU COME ACROSS ANY JUNK / SPAM MAIL, DO THE FOLLOWING
a) Remove the mail.
b) Inform the security help desk
c) Inform the same to server administrator
d) Inform the sender that such mails are undesired
DONT’S
 DO NOT USE OFFICIAL ID FOR ANY PERSONAL SUBSCRIPTION PURPOSE
 DO NOT SEND UNSOLICITED MAILS OF ANY TYPE LIKE CHAIN LETTERS OR
E-MAIL HOAX
 DO NOT SEND MAILS TO CLIENT UNLESS YOU ARE AUTHORIZED TO DO SO
 DO NOT POST NON-BUSINESS RELATED INFORMATION TO LARGE NUMBER OF USERS
 DO NOT OPEN THE MAIL OR ATTACHMENT WHICH IS SUSPECTED TO BE VIRUS OR RECEIVED FROM
AN UNIDENTIFIED SENDER
ISO 27002:2005
(CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT)
DEFINES INFORMATION SECURITY AS THE
PRESERVATION OF:
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
CONFIDENTIALITY
CONFIDENTIALITY OF INFORMATION REFERS TO THE PROTECTION OF
INFORMATION FROM UNAUTHORIZED DISCLOSURE. THE IMPACT OF
UNAUTHORIZED DISCLOSURE OF CONFIDENTIAL INFORMATION CAN
RANGE FROM JEOPARDIZING ORGANIZATION SECURITY TO THE
DISCLOSURE OF PRIVATE DATA OF EMPLOYEES.
INTEGRITY
INTEGRITY REFERS TO THE COMPLETENESS AND ACCURACY OF
INFORMATION. INTEGRITY IS LOST IF UNAUTHORIZED CHANGES ARE
MADE TO DATA OR IT SYSTEM BY EITHER INTENTIONAL OR ACCIDENTAL
ACTS. IF INTEGRITY OF DATA IS NOT RESTORED BACK, CONTINUED USE
OF THE CONTAMINATED DATA COULD RESULT IN INACCURACY, FRAUD, OR
ERRONEOUS DECISIONS.
AVAILABILITY
AVAILABILITY INDICATES HOW SOON THE INFORMATION IS REQUIRED, IN
CASE THE SAME IS LOST. IF CRITICAL INFORMATION IS UNAVAILABLE TO
ITS END USERS, THE ORGANIZATION’S MISSION MAY BE AFFECTED.
THANK YOU
Prepared by : -
Aman jain

More Related Content

What's hot

Information security
 Information security Information security
Information securityJin Castor
 
Information security
Information security Information security
Information security AishaIshaq4
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Securitychauhankapil
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 

What's hot (20)

Information security
 Information security Information security
Information security
 
Information security
Information security Information security
Information security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information security
Information securityInformation security
Information security
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Information security
Information securityInformation security
Information security
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Information security
Information securityInformation security
Information security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Application security
Application securityApplication security
Application security
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 

Similar to IT security

NIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxNIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxchandutidake
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docxarnoldmeredith47041
 
Network security
Network securityNetwork security
Network securityROBERT S
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?Lucy Zeniffer
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the HourVijay Dalmia
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfHost It Smart
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxprashanth73488
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?Echoworx
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sARYAS87
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Jim Brashear
 

Similar to IT security (20)

NIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxNIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptx
 
Powerful email protection
Powerful email protectionPowerful email protection
Powerful email protection
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docx
 
Network security
Network securityNetwork security
Network security
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the Hour
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?
 
Risks & secutiry in e commerce
Risks & secutiry in e commerceRisks & secutiry in e commerce
Risks & secutiry in e commerce
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. s
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

IT security

  • 2.  WHAT IS INFORMATION?  WHAT IS THE RISK RELATED TO INFORMATION?  WHAT IS INFORMATION SECURITY?
  • 3. INFORMATION IS AN ASSET WHICH, LIKE OTHER IMPORTANT BUSINESS ASSETS, HAS VALUE TO AN ORGANIZATION AND CONSEQUENTLY NEEDS TO BE SUITABLY PROTECTED.
  • 4. INFORMATION CAN BE : -  CREATED  STORED  DESTROYED  PROCESSED  TRANSMITTED  USED  CORRUPTED  LOST  STOLEN
  • 5. WHAT IS INFORMATION SECURITY? THE QUALITY OR STATE OF BEING SECURE TO BE FREE FROM DANGER. SECURITY IS RECOGNIZED AS ESSENTIAL TO PROTECT VITAL PROCESSES AND THE SYSTEMS THAT PROVIDE THOSE PROCESSES. SECURITY IS ACHIEVED USING SEVERAL STRATEGIES.
  • 6. SECURITY BREACHES LEADS TO : - • REPUTATION LOSS • FINANCIAL LOSS • INTELLECTUAL PROPERTY LOSS • LEGISLATIVE BREACHES LEADING TO LEGAL ACTIONS (CYBER LAW) • LOSS OF CUSTOMER CONFIDENCE • BUSINESS INTERRUPTION COSTS • LOSS OF GOODWILL
  • 7. PEOPLE WHO USE OR INTERACT WITH THE INFORMATION INCLUDE:  SHARE HOLDERS / OWNERS  MANAGEMENT  EMPLOYEES  BUSINESS PARTNERS  SERVICE PROVIDERS  CONTRACTORS  CUSTOMERS / CLIENTS
  • 8. WHAT CAN WE DO TO IMPROVE INFORMATION SECURITY??
  • 9. PHYSICAL SECURITY COMPONENTS:  CCTV CAMERAS  CLOCK IN SYSTEMS / BIOMETRICS  ENVIRONMENTAL MANAGEMENT SYSTEMS: HUMIDITY CONTROL, VENTILATION , AIR CONDITIONING, FIRE CONTROL SYSTEMS  ELECTRICITY / POWER BACKUP
  • 10. ACCESS TO DEVICES: o DESKTOP COMPUTERS o LAPTOPS, ULTRA-MOBILE LAPTOPS o DIGITAL CAMERAS, PRINTERS, SCANNERS, PHOTOCOPIER ETC.
  • 11. PASSWORD GUIDELINES : - DO’S  ALWAYS USE AT LEAST8 CHARACTER PASSWORD WITH COMBINATION OF ALPHABETS, NUMBERS AND SPECIAL CHARACTERS (*, %, @, #, $, ^)  USE PASSWORDS THAT CAN BE EASILY REMEMBERED BY YOU  CHANGE PASSWORD REGULARLY AS PER POLICY  USE PASSWORD THAT IS SIGNIFICANTLY DIFFERENT FROM EARLIER PASSWORDS DON’T’S  USE PASSWORDS WHICH REVEALS YOUR PERSONAL INFORMATION OR WORDS FOUND IN DICTIONARY  WRITE DOWN OR STORE PASSWORDS  SHARE PASSWORDS OVER PHONE OR EMAIL  USE PASSWORDS WHICH DO NOT MATCH ABOVE COMPLEXITY CRITERIA
  • 12. INTERNET USAGE : - USE INTERNET FOR BUSINESS PURPOSE ONLY  DO NOT ACCESS INTERNET THROUGH DIAL-UP CONNECTIVITY  DO NOT USE INTERNET FOR VIEWING, STORINGOR TRANSMITTING OBSCENE OR PORNOGRAPHIC MATERIAL  DO NOT USE INTERNET FOR ACCESSING AUCTION SITES  DO NOT USE INTERNET FOR HACKING OTHER COMPUTER SYSTEMS  DO NOT USE INTERNET TO DOWNLOAD / UPLOAD COMMERCIAL SOFTWARE / COPYRIGHTED MATERIAL
  • 13. E-MAIL USAGE : - DO’S USE OFFICIAL MAIL FOR BUSINESS PURPOSES ONLY FOLLOW THE MAIL STORAGE GUIDELINES TO AVOID BLOCKING OF E-MAILS  IF YOU COME ACROSS ANY JUNK / SPAM MAIL, DO THE FOLLOWING a) Remove the mail. b) Inform the security help desk c) Inform the same to server administrator d) Inform the sender that such mails are undesired DONT’S  DO NOT USE OFFICIAL ID FOR ANY PERSONAL SUBSCRIPTION PURPOSE  DO NOT SEND UNSOLICITED MAILS OF ANY TYPE LIKE CHAIN LETTERS OR E-MAIL HOAX  DO NOT SEND MAILS TO CLIENT UNLESS YOU ARE AUTHORIZED TO DO SO  DO NOT POST NON-BUSINESS RELATED INFORMATION TO LARGE NUMBER OF USERS  DO NOT OPEN THE MAIL OR ATTACHMENT WHICH IS SUSPECTED TO BE VIRUS OR RECEIVED FROM AN UNIDENTIFIED SENDER
  • 14. ISO 27002:2005 (CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT) DEFINES INFORMATION SECURITY AS THE PRESERVATION OF: CONFIDENTIALITY INTEGRITY AVAILABILITY
  • 15. CONFIDENTIALITY CONFIDENTIALITY OF INFORMATION REFERS TO THE PROTECTION OF INFORMATION FROM UNAUTHORIZED DISCLOSURE. THE IMPACT OF UNAUTHORIZED DISCLOSURE OF CONFIDENTIAL INFORMATION CAN RANGE FROM JEOPARDIZING ORGANIZATION SECURITY TO THE DISCLOSURE OF PRIVATE DATA OF EMPLOYEES.
  • 16. INTEGRITY INTEGRITY REFERS TO THE COMPLETENESS AND ACCURACY OF INFORMATION. INTEGRITY IS LOST IF UNAUTHORIZED CHANGES ARE MADE TO DATA OR IT SYSTEM BY EITHER INTENTIONAL OR ACCIDENTAL ACTS. IF INTEGRITY OF DATA IS NOT RESTORED BACK, CONTINUED USE OF THE CONTAMINATED DATA COULD RESULT IN INACCURACY, FRAUD, OR ERRONEOUS DECISIONS.
  • 17. AVAILABILITY AVAILABILITY INDICATES HOW SOON THE INFORMATION IS REQUIRED, IN CASE THE SAME IS LOST. IF CRITICAL INFORMATION IS UNAVAILABLE TO ITS END USERS, THE ORGANIZATION’S MISSION MAY BE AFFECTED.
  • 18. THANK YOU Prepared by : - Aman jain