16

Click here to load reader

Information Security Lecture #1 ppt

Embed Size (px)

DESCRIPTION

My Class Lecture #1 about Basics in Information security

Citation preview

Page 1: Information Security Lecture #1 ppt

LECTURE #1

Presented ByMrs.Vasanthi Muniasamy

INFORMATION SECURITY

Page 2: Information Security Lecture #1 ppt

DEFINITION:

The protection of information and its elements including systems, hardware that use, store and transmit the information

Page 3: Information Security Lecture #1 ppt

PRIMARY GOALS

CIA triangle known as security triad tells the primary goals of IS

Confidentiality Making sure that those who should not see

informationIntegrity

Making sure that the information has not been changed from its original

AvailabilityMaking sure that the information is available for use when you need it

Page 4: Information Security Lecture #1 ppt

DATA TYPESPublic

Private / Internal

Confidential

Secret

Page 5: Information Security Lecture #1 ppt

PUBLICData is shown to all the end users

Page 6: Information Security Lecture #1 ppt

PRIVATE / INTERNAL

A group of company peoples only know, but outside peoples should not know like Personal Identification Number (PIN)

Page 7: Information Security Lecture #1 ppt

CONFIDENTIAL

Data is used by limited number of private users, and should not be known to the majority of workers

Page 8: Information Security Lecture #1 ppt

SECREAT Data is known by the very high authority

persons only. Lose of this data may cause critical damage to the company.

Page 9: Information Security Lecture #1 ppt

SECURITY TYPESPhysical Security

Personal Security

Operations Security

Communications Security

Network Security

Information Security.

Page 10: Information Security Lecture #1 ppt

PHYISCAL SECURITYTo protect Physical items, objects or areas

Page 11: Information Security Lecture #1 ppt

PERSONAL SECURITY

To protect the individual or group of individuals who are authorized

Page 12: Information Security Lecture #1 ppt

OPERATION SECURITY

To protect the details of a particular operation or activities

Page 13: Information Security Lecture #1 ppt

COMMUNICATION SECURITY

To protect communication media, technology and content

Page 14: Information Security Lecture #1 ppt

NETWORK SECURITY

To protect networking components, connections and contents

Page 15: Information Security Lecture #1 ppt

INFORMATION SECURITY

To protect information assets

Page 16: Information Security Lecture #1 ppt

THANK U