SlideShare una empresa de Scribd logo
1 de 12
PG &
Associates
Information Security



Confidentiality
Integrity
Availability
Information Security



Confidentiality
Assurance that information is shared only among authorised persons or
organisations. Breaches of Confidentiality can occur when data is not handled in
a manner adequate to safeguard the confidentiality of the information
concerned. Such disclosure can take place by word of mouth, by printing,
copying, e-mailing or creating documents and other data etc. The classification
of the information should determine is confidentiality and hence the appropriate
safeguards.
Information Security


Integrity
Assurance that the information is authentic and complete. Ensuring that
information can be relied upon to be sufficiently accurate for its purpose. The
term Integrity is used frequently when considering Information Security as it is
represents one of the primary indicators of security (or lack of it). The integrity
of data is not only whether the data is 'correct', but whether it can be trusted and
relied upon. For example, making copies (say by e-mailing a file) of a sensitive
document, threatens both confidentiality and the integrity of the information.
Why? Because, by making one or more copies, the data is then at risk of change
or modification.
Information Security


Availability

Assurance that the systems responsible for delivering, storing and processing
information are accessible when needed, by those who need them.
Confusion
                   Information Security
                       vs IT Security
                      vs Data Security

Information Security is:

The terms information security, computer security and information
assurance are frequently used interchangeably. These fields are
interrelated often and share the common goals of protecting the
confidentiality, integrity and availability of information; however, there
are some subtle differences between them.

These differences lie primarily in the approach to the subject, the
methodologies used, and the areas of concentration. Information
security is concerned with the confidentiality, integrity and availability
of data regardless of the form the data may take: electronic, print, or
other forms.
Confusion
                      Information Security
                          vs IT Security
                         vs Data Security

IT (Information Technology) Security is:

IT security is about protecting the integrity, accessibility, and reliability
of electronic information and with the behaviors and actions of
computer users as they impact the privacy and safety of all members of
the Internet community. IT security works with physical security to
ensure protection of information, whether electronic or hardcopy.
Confusion
         Information Security vs IT Security vs Data Security




Data Security is:

In simple terms, data security is the practice of keeping data protected
from corruption and unauthorized access. The focus behind data
security is to ensure privacy while protecting personal or corporate
data.
Solution
Security Tiers
You Want More




     Talk to us at:

Pg&Assocoates@stt.co.za

  +27 (0)12 346 0332
Information Security
                 Services



1. Physical Security
2. Network Security
3. Protocols / Services
4. User Security
5. Data Storage Security
6. Passwords
7. System Administration

Más contenido relacionado

La actualidad más candente

Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsMaurice Dawson
 
Introduction to the management of information security
Introduction to the management of information security  Introduction to the management of information security
Introduction to the management of information security Sammer Qader
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore Seclore
 
Infomation security
Infomation securityInfomation security
Infomation securityMeet Soni
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)brentcarey
 
Privacy, Data Protection and SNS
Privacy, Data Protection and SNSPrivacy, Data Protection and SNS
Privacy, Data Protection and SNSdariphagen
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | SecloreSeclore
 
Understand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming ProcessUnderstand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming ProcessCasey Robertson
 
Email encryption plus | Seclore
Email encryption plus | SecloreEmail encryption plus | Seclore
Email encryption plus | SecloreSeclore
 
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...Khazret Sapenov
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Editor IJCATR
 
internet and intra net
internet and intra netinternet and intra net
internet and intra netNaga Dinesh
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreSeclore
 
One click protection in microsoft office
One click protection in microsoft officeOne click protection in microsoft office
One click protection in microsoft officeSeclore
 

La actualidad más candente (20)

Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of Things
 
Introduction to the management of information security
Introduction to the management of information security  Introduction to the management of information security
Introduction to the management of information security
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore
 
Infomation security
Infomation securityInfomation security
Infomation security
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)
 
Privacy, Data Protection and SNS
Privacy, Data Protection and SNSPrivacy, Data Protection and SNS
Privacy, Data Protection and SNS
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
 
IQProtector Suite
IQProtector SuiteIQProtector Suite
IQProtector Suite
 
Understand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming ProcessUnderstand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming Process
 
Email encryption plus | Seclore
Email encryption plus | SecloreEmail encryption plus | Seclore
Email encryption plus | Seclore
 
Jb ia
Jb   iaJb   ia
Jb ia
 
Data security training
Data security trainingData security training
Data security training
 
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...
 
internet and intra net
internet and intra netinternet and intra net
internet and intra net
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | Seclore
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
One click protection in microsoft office
One click protection in microsoft officeOne click protection in microsoft office
One click protection in microsoft office
 
Is ch1 (2)
Is ch1 (2)Is ch1 (2)
Is ch1 (2)
 

Destacado

Gdg almaty. Функциональное программирование в Java 8
Gdg almaty. Функциональное программирование в Java 8Gdg almaty. Функциональное программирование в Java 8
Gdg almaty. Функциональное программирование в Java 8Madina Kamzina
 
Пути обхода граблей в стартапах. GDG Almaty
Пути обхода граблей в стартапах. GDG AlmatyПути обхода граблей в стартапах. GDG Almaty
Пути обхода граблей в стартапах. GDG AlmatyMadina Kamzina
 
10 Gebote zur Fotografie
10 Gebote zur Fotografie10 Gebote zur Fotografie
10 Gebote zur FotografieChristina_l_m
 
Nigeria state of digital media
Nigeria  state of digital mediaNigeria  state of digital media
Nigeria state of digital mediaElo Umeh
 
Audience feedback statistics
Audience feedback statisticsAudience feedback statistics
Audience feedback statisticsgabbi_abi
 
Lean start up & innovation
Lean start up & innovationLean start up & innovation
Lean start up & innovationElo Umeh
 

Destacado (6)

Gdg almaty. Функциональное программирование в Java 8
Gdg almaty. Функциональное программирование в Java 8Gdg almaty. Функциональное программирование в Java 8
Gdg almaty. Функциональное программирование в Java 8
 
Пути обхода граблей в стартапах. GDG Almaty
Пути обхода граблей в стартапах. GDG AlmatyПути обхода граблей в стартапах. GDG Almaty
Пути обхода граблей в стартапах. GDG Almaty
 
10 Gebote zur Fotografie
10 Gebote zur Fotografie10 Gebote zur Fotografie
10 Gebote zur Fotografie
 
Nigeria state of digital media
Nigeria  state of digital mediaNigeria  state of digital media
Nigeria state of digital media
 
Audience feedback statistics
Audience feedback statisticsAudience feedback statistics
Audience feedback statistics
 
Lean start up & innovation
Lean start up & innovationLean start up & innovation
Lean start up & innovation
 

Similar a Information Security - Confidentiality, Integrity, Availability

Fundamentals of Information Security..pdf
Fundamentals of Information Security..pdfFundamentals of Information Security..pdf
Fundamentals of Information Security..pdfZahid Hussain
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxInfosectrain3
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Dr. Prashant Vats
 
Cryptography and Network Security Principles and PracticeEigh
Cryptography and Network Security Principles and PracticeEighCryptography and Network Security Principles and PracticeEigh
Cryptography and Network Security Principles and PracticeEighMargenePurnell14
 
Cyber security
Cyber securityCyber security
Cyber securityPrem Raval
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Information security
Information securityInformation security
Information securitySanjay Tiwari
 
Information security
Information securityInformation security
Information securityOnkar Sule
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message SecurityNrapesh Shah
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Securityijtsrd
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdfFahadZaman38
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk MitigationMukalele Rogers
 

Similar a Information Security - Confidentiality, Integrity, Availability (20)

Fundamentals of Information Security..pdf
Fundamentals of Information Security..pdfFundamentals of Information Security..pdf
Fundamentals of Information Security..pdf
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000
 
Security in it
Security in it Security in it
Security in it
 
Cryptography and Network Security Principles and PracticeEigh
Cryptography and Network Security Principles and PracticeEighCryptography and Network Security Principles and PracticeEigh
Cryptography and Network Security Principles and PracticeEigh
 
Cyber security
Cyber securityCyber security
Cyber security
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Information security
Information securityInformation security
Information security
 
Information security
Information securityInformation security
Information security
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
security IDS
security IDSsecurity IDS
security IDS
 

Information Security - Confidentiality, Integrity, Availability

  • 3. Information Security Confidentiality Assurance that information is shared only among authorised persons or organisations. Breaches of Confidentiality can occur when data is not handled in a manner adequate to safeguard the confidentiality of the information concerned. Such disclosure can take place by word of mouth, by printing, copying, e-mailing or creating documents and other data etc. The classification of the information should determine is confidentiality and hence the appropriate safeguards.
  • 4. Information Security Integrity Assurance that the information is authentic and complete. Ensuring that information can be relied upon to be sufficiently accurate for its purpose. The term Integrity is used frequently when considering Information Security as it is represents one of the primary indicators of security (or lack of it). The integrity of data is not only whether the data is 'correct', but whether it can be trusted and relied upon. For example, making copies (say by e-mailing a file) of a sensitive document, threatens both confidentiality and the integrity of the information. Why? Because, by making one or more copies, the data is then at risk of change or modification.
  • 5. Information Security Availability Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them.
  • 6. Confusion Information Security vs IT Security vs Data Security Information Security is: The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.
  • 7. Confusion Information Security vs IT Security vs Data Security IT (Information Technology) Security is: IT security is about protecting the integrity, accessibility, and reliability of electronic information and with the behaviors and actions of computer users as they impact the privacy and safety of all members of the Internet community. IT security works with physical security to ensure protection of information, whether electronic or hardcopy.
  • 8. Confusion Information Security vs IT Security vs Data Security Data Security is: In simple terms, data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data.
  • 11. You Want More Talk to us at: Pg&Assocoates@stt.co.za +27 (0)12 346 0332
  • 12. Information Security Services 1. Physical Security 2. Network Security 3. Protocols / Services 4. User Security 5. Data Storage Security 6. Passwords 7. System Administration