SlideShare a Scribd company logo
What is Information
Security and its
types?
Information security has been
assigned to look after the
protection of records and data
of organizations from
unauthorized access.
www.ecadema.com
Confidentiality
Focusing that the information couldn’t
be disclosed to any unauthorized
individuals, entities, and processes,
breaching confidentiality is taken care
of at a top-notch level.
www.ecadema.com
Integrity
Focusing on maintaining the accuracy and
entirety of the data. Suppose an employee of a
particular department left the organization
then all other departments will be informed
about the “job left” status so that data is
complete and accurate and in addition to this
only authorized persons should be allowed to
edit employee data.
www.ecadema.com
Availability
Whenever needed, data should be available and accessible to
authorized personalities to run the work process in a smooth
way. In case, one needs access to an employee’s profile and
working credentials, it requires collaboration from different
organizational teams like network operations, development
operations, incident response, and policy/change management.
www.ecadema.com
Non-repudiation
means that there couldn’t be any denial of sending or receiving the messages or
transactions. For instance, in cryptography, messages that match the digital
signature signed with the sender’s private key and that sender could have sent a
message and nobody else could have altered it in transit is sufficient.
www.ecadema.com
Authenticity
It claims the verification of the
users’ profile and the information
provided by the employee to be
true or not and its source. This
principle guarantees the validity of
the message source.
www.ecadema.com
Thank you!
Address- 651 N Broad St, Middletown
Middletown, DE 19709, United States
Mail id - ecadema0@gmail.com
Website - www.ecadema.com

More Related Content

Similar to What is information security and its types

Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
Infosectrain3
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
jayceewong1
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure Communications
Kavika Roy
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
AbdullahKanash
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Apurva323420
 
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxModule 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptx
Humphrey Humphrey
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
todd271
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
healdkathaleen
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
V2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
V2Infotech1
 
Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdf
orage technologies
 
Data Security.pdf
Data Security.pdfData Security.pdf
Data Security.pdf
FujifilmFbsg
 
Best Data Privacy certification.pdf
Best Data Privacy certification.pdfBest Data Privacy certification.pdf
Best Data Privacy certification.pdf
tsaaroacademy
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
Precise Testing Solution
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
RSIS International
 
An insight into information security.pdf
An insight into information security.pdfAn insight into information security.pdf
An insight into information security.pdf
Securityium
 

Similar to What is information security and its types (20)

Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure Communications
 
security IDS
security IDSsecurity IDS
security IDS
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxModule 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptx
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdf
 
Data Security.pdf
Data Security.pdfData Security.pdf
Data Security.pdf
 
Best Data Privacy certification.pdf
Best Data Privacy certification.pdfBest Data Privacy certification.pdf
Best Data Privacy certification.pdf
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
 
Ss
SsSs
Ss
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
An insight into information security.pdf
An insight into information security.pdfAn insight into information security.pdf
An insight into information security.pdf
 

More from Online Training

Overcoming Challenges in the Training of Trainers Strategies for Success.pdf
Overcoming Challenges in the Training of Trainers Strategies for Success.pdfOvercoming Challenges in the Training of Trainers Strategies for Success.pdf
Overcoming Challenges in the Training of Trainers Strategies for Success.pdf
Online Training
 
Career Opportunities for Certified Management Accountants.pdf
Career Opportunities for Certified Management Accountants.pdfCareer Opportunities for Certified Management Accountants.pdf
Career Opportunities for Certified Management Accountants.pdf
Online Training
 
The Role of a CFA in Today’s Financial Industry.pdf
The Role of a CFA in Today’s Financial Industry.pdfThe Role of a CFA in Today’s Financial Industry.pdf
The Role of a CFA in Today’s Financial Industry.pdf
Online Training
 
Effective Cross-Cultural Communication in International HR.pdf
Effective Cross-Cultural Communication in International HR.pdfEffective Cross-Cultural Communication in International HR.pdf
Effective Cross-Cultural Communication in International HR.pdf
Online Training
 
7 Essential IT Project Management Skills You Need to Succeed.pdf
7 Essential IT Project Management Skills You Need to Succeed.pdf7 Essential IT Project Management Skills You Need to Succeed.pdf
7 Essential IT Project Management Skills You Need to Succeed.pdf
Online Training
 
Tips and Tricks for Working as an Accountant.pdf
Tips and Tricks for Working as an Accountant.pdfTips and Tricks for Working as an Accountant.pdf
Tips and Tricks for Working as an Accountant.pdf
Online Training
 
10 Essential Skills for Project Management Professionals.pdf
10 Essential Skills for Project Management Professionals.pdf10 Essential Skills for Project Management Professionals.pdf
10 Essential Skills for Project Management Professionals.pdf
Online Training
 
The Top 5 Skills for IT Project Managers
The Top 5 Skills for IT Project ManagersThe Top 5 Skills for IT Project Managers
The Top 5 Skills for IT Project Managers
Online Training
 
What is a corporate trainer.pdf
What is a corporate trainer.pdfWhat is a corporate trainer.pdf
What is a corporate trainer.pdf
Online Training
 
ecadema course offered
ecadema course offeredecadema course offered
ecadema course offered
Online Training
 
Online education
Online educationOnline education
Online education
Online Training
 
What is a corporate trainer (3).pdf
What is a corporate trainer (3).pdfWhat is a corporate trainer (3).pdf
What is a corporate trainer (3).pdf
Online Training
 
Professional development - why it is important.pdf
Professional development - why it is important.pdfProfessional development - why it is important.pdf
Professional development - why it is important.pdf
Online Training
 
EVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdf
EVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdfEVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdf
EVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdf
Online Training
 
5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf
5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf
5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf
Online Training
 
Online Learning Platform.pdf
Online Learning Platform.pdfOnline Learning Platform.pdf
Online Learning Platform.pdf
Online Training
 
Corporate Training & Online Education.pdf
Corporate Training & Online Education.pdfCorporate Training & Online Education.pdf
Corporate Training & Online Education.pdf
Online Training
 
5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf
5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf
5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf
Online Training
 
Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...
Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...
Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...
Online Training
 
Financial Risk Management.pdf
Financial Risk Management.pdfFinancial Risk Management.pdf
Financial Risk Management.pdf
Online Training
 

More from Online Training (20)

Overcoming Challenges in the Training of Trainers Strategies for Success.pdf
Overcoming Challenges in the Training of Trainers Strategies for Success.pdfOvercoming Challenges in the Training of Trainers Strategies for Success.pdf
Overcoming Challenges in the Training of Trainers Strategies for Success.pdf
 
Career Opportunities for Certified Management Accountants.pdf
Career Opportunities for Certified Management Accountants.pdfCareer Opportunities for Certified Management Accountants.pdf
Career Opportunities for Certified Management Accountants.pdf
 
The Role of a CFA in Today’s Financial Industry.pdf
The Role of a CFA in Today’s Financial Industry.pdfThe Role of a CFA in Today’s Financial Industry.pdf
The Role of a CFA in Today’s Financial Industry.pdf
 
Effective Cross-Cultural Communication in International HR.pdf
Effective Cross-Cultural Communication in International HR.pdfEffective Cross-Cultural Communication in International HR.pdf
Effective Cross-Cultural Communication in International HR.pdf
 
7 Essential IT Project Management Skills You Need to Succeed.pdf
7 Essential IT Project Management Skills You Need to Succeed.pdf7 Essential IT Project Management Skills You Need to Succeed.pdf
7 Essential IT Project Management Skills You Need to Succeed.pdf
 
Tips and Tricks for Working as an Accountant.pdf
Tips and Tricks for Working as an Accountant.pdfTips and Tricks for Working as an Accountant.pdf
Tips and Tricks for Working as an Accountant.pdf
 
10 Essential Skills for Project Management Professionals.pdf
10 Essential Skills for Project Management Professionals.pdf10 Essential Skills for Project Management Professionals.pdf
10 Essential Skills for Project Management Professionals.pdf
 
The Top 5 Skills for IT Project Managers
The Top 5 Skills for IT Project ManagersThe Top 5 Skills for IT Project Managers
The Top 5 Skills for IT Project Managers
 
What is a corporate trainer.pdf
What is a corporate trainer.pdfWhat is a corporate trainer.pdf
What is a corporate trainer.pdf
 
ecadema course offered
ecadema course offeredecadema course offered
ecadema course offered
 
Online education
Online educationOnline education
Online education
 
What is a corporate trainer (3).pdf
What is a corporate trainer (3).pdfWhat is a corporate trainer (3).pdf
What is a corporate trainer (3).pdf
 
Professional development - why it is important.pdf
Professional development - why it is important.pdfProfessional development - why it is important.pdf
Professional development - why it is important.pdf
 
EVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdf
EVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdfEVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdf
EVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdf
 
5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf
5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf
5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf
 
Online Learning Platform.pdf
Online Learning Platform.pdfOnline Learning Platform.pdf
Online Learning Platform.pdf
 
Corporate Training & Online Education.pdf
Corporate Training & Online Education.pdfCorporate Training & Online Education.pdf
Corporate Training & Online Education.pdf
 
5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf
5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf
5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf
 
Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...
Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...
Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...
 
Financial Risk Management.pdf
Financial Risk Management.pdfFinancial Risk Management.pdf
Financial Risk Management.pdf
 

Recently uploaded

How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

What is information security and its types

  • 1. What is Information Security and its types? Information security has been assigned to look after the protection of records and data of organizations from unauthorized access. www.ecadema.com
  • 2. Confidentiality Focusing that the information couldn’t be disclosed to any unauthorized individuals, entities, and processes, breaching confidentiality is taken care of at a top-notch level. www.ecadema.com
  • 3. Integrity Focusing on maintaining the accuracy and entirety of the data. Suppose an employee of a particular department left the organization then all other departments will be informed about the “job left” status so that data is complete and accurate and in addition to this only authorized persons should be allowed to edit employee data. www.ecadema.com
  • 4. Availability Whenever needed, data should be available and accessible to authorized personalities to run the work process in a smooth way. In case, one needs access to an employee’s profile and working credentials, it requires collaboration from different organizational teams like network operations, development operations, incident response, and policy/change management. www.ecadema.com
  • 5. Non-repudiation means that there couldn’t be any denial of sending or receiving the messages or transactions. For instance, in cryptography, messages that match the digital signature signed with the sender’s private key and that sender could have sent a message and nobody else could have altered it in transit is sufficient. www.ecadema.com
  • 6. Authenticity It claims the verification of the users’ profile and the information provided by the employee to be true or not and its source. This principle guarantees the validity of the message source. www.ecadema.com
  • 7. Thank you! Address- 651 N Broad St, Middletown Middletown, DE 19709, United States Mail id - ecadema0@gmail.com Website - www.ecadema.com