SlideShare a Scribd company logo
1 of 6
Security ICT GCSE
Loss of Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Threats to data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data theft ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ways of securing data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Quality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Hem infotech company profile
Hem infotech  company profileHem infotech  company profile
Hem infotech company profileHem Infotech
 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges Behak Kangarloo
 
06. security concept
06. security concept06. security concept
06. security conceptMuhammad Ahad
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Document Security
Document SecurityDocument Security
Document SecurityTim O'Leary
 
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITYFOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITYTim O'Leary
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Securitymanoharparakh
 
Messaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationMessaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationWaterstons Ltd
 
Information and network security 2 nist security definition
Information and network security 2 nist security definitionInformation and network security 2 nist security definition
Information and network security 2 nist security definitionVaibhav Khanna
 
Information and network security 3 security challenges
Information and network security 3 security challengesInformation and network security 3 security challenges
Information and network security 3 security challengesVaibhav Khanna
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and ControlSyama Raveendran
 

What's hot (20)

Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Hem infotech company profile
Hem infotech  company profileHem infotech  company profile
Hem infotech company profile
 
Data Security
Data SecurityData Security
Data Security
 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges
 
06. security concept
06. security concept06. security concept
06. security concept
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Document Security
Document SecurityDocument Security
Document Security
 
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITYFOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Security
 
Messaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationMessaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your Reputation
 
Information and network security 2 nist security definition
Information and network security 2 nist security definitionInformation and network security 2 nist security definition
Information and network security 2 nist security definition
 
Information and network security 3 security challenges
Information and network security 3 security challengesInformation and network security 3 security challenges
Information and network security 3 security challenges
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
E business security
E business securityE business security
E business security
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Siem requirement.pdfsd
Siem requirement.pdfsdSiem requirement.pdfsd
Siem requirement.pdfsd
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and Control
 

Viewers also liked (6)

Economies and Diseconomies of scale
Economies and Diseconomies of scaleEconomies and Diseconomies of scale
Economies and Diseconomies of scale
 
Finance - Improving Cash Flow
Finance - Improving Cash FlowFinance - Improving Cash Flow
Finance - Improving Cash Flow
 
Economies of scale
Economies of scaleEconomies of scale
Economies of scale
 
Economies & diseconomies of scale
Economies & diseconomies of scaleEconomies & diseconomies of scale
Economies & diseconomies of scale
 
Economies Of Scale
Economies Of ScaleEconomies Of Scale
Economies Of Scale
 
Cash Flow Statement PPT
Cash Flow Statement PPTCash Flow Statement PPT
Cash Flow Statement PPT
 

Similar to Security

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And PrivacyMISY
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.pptRoshni814224
 
08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.pptRoshni814224
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
Computer system security and control-2.pptx
Computer system security and control-2.pptxComputer system security and control-2.pptx
Computer system security and control-2.pptxDaveN31
 
Module 5 security
Module 5   securityModule 5   security
Module 5 securityIT
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of DataMISY
 
14 - Computer Security.pdf
14 - Computer Security.pdf14 - Computer Security.pdf
14 - Computer Security.pdfLakshyaKhowala
 
Securing information system
Securing information systemSecuring information system
Securing information systemTanjim Rasul
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
It security
It securityIt security
It securityavi2607
 
ITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docxITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docxdonnajames55
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptxKhristine Botin
 
Typical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfTypical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfaptexx
 

Similar to Security (20)

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.ppt
 
08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Computer system security and control-2.pptx
Computer system security and control-2.pptxComputer system security and control-2.pptx
Computer system security and control-2.pptx
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
security IDS
security IDSsecurity IDS
security IDS
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
14 - Computer Security.pdf
14 - Computer Security.pdf14 - Computer Security.pdf
14 - Computer Security.pdf
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
It security
It securityIt security
It security
 
ITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docxITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docx
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
Typical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfTypical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdf
 

More from mrbennett2009

More from mrbennett2009 (19)

Creating A Website Using Dreamweaver
Creating A Website Using DreamweaverCreating A Website Using Dreamweaver
Creating A Website Using Dreamweaver
 
Web Intro
Web IntroWeb Intro
Web Intro
 
The Internet
The InternetThe Internet
The Internet
 
Systems Life Cycle
Systems Life CycleSystems Life Cycle
Systems Life Cycle
 
Storage
StorageStorage
Storage
 
Software
SoftwareSoftware
Software
 
Public Information Systems
Public Information SystemsPublic Information Systems
Public Information Systems
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Networking
NetworkingNetworking
Networking
 
Ict And Society
Ict And SocietyIct And Society
Ict And Society
 
Databases
DatabasesDatabases
Databases
 
Input And Output Devices
Input And Output DevicesInput And Output Devices
Input And Output Devices
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Backup And File Management
Backup And File ManagementBackup And File Management
Backup And File Management
 
Computer Systems
Computer SystemsComputer Systems
Computer Systems
 
Control Intro
Control IntroControl Intro
Control Intro
 
Data Logging And Control
Data Logging And ControlData Logging And Control
Data Logging And Control
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Application Types
Application TypesApplication Types
Application Types
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Security