Upload
abigail-hardy
View
213
Download
1
Embed Size (px)
Citation preview
Threat
An action or event that can lead the some loss is known as threat.
Types of Threat
There are two types of threat.i. Physical threatii. Logical threat
Types of Threat
i. Physical threat:Damage cause to the
physical infrastructure of information system.
Examples:Earth quick, electric short
fload
Types of Threat
ii. Logical threat:Damage threat cause to
the logical life of information system.Examples:
Virus and intangible object etc
Security
To be free from damager. OR
Prevents unauthorized access, alteration theft, or physical damage.
Types of Security
There are five types of security.i. Physical Securityii. Personal Securityiii. Operational Securityiv. Network Securityv. Communication Securityvi. Information Security
Types of Security
i. Physical Security:To protect the physical
object, item form unauthorized execs.ii. Personal Security:
To protect individual or group of individual who are authorize person of an organization.
Types of Security
iii. Operational Security:To protect the event,
operation and set of activity of an organization.
iv. Network Security:To protect network and
networking component of an organization.
Types of Security
v. Communication Security:To protect the
communication media, technology and contents of an organization.
vi. Information Security:To protect information of
an organization. Information security is confidentially, integrity and availability of information.
vi. Information Security
Types of information security:There are three types of information
security.i. Confidentiallyii. Integrityiii. Availability
Types of Information security
i. Confidentially:In context to information security
confidentially means that information should stay secret only authorize people can access the information.
ii. Integrity:Integrity is concerned with trust
worthy, origin, completeness and correctness of information.
Types of Information Security
iii. Availability: To secure the information of an organization.
OR assuring that authorized users have continued
and timely access to information and resources - e.g., preventing an adversary from flooding a network with bogus traffic that delays legitimate traffic such as that containing new orders from being transmitted