SlideShare una empresa de Scribd logo
1 de 16
INFORMATION SECURITY
DEFINITION:
The protection of information and its elements including
systems, hardware that use, store and transmit the
information
PRIMARY GOALS
  CIA triangle known as security triad tells the primary goals
  of IS
 Confidentiality
        Making sure that those who should not see
  information
 Integrity
  Making sure that the information has not been changed
  from its original
 Availability
  Making sure that the information is available for use when
  you need it
DATA TYPES
 Public


 Private / Internal


 Confidential


 Secret
PUBLIC
Data is shown to all the end users
PRIVATE / INTERNAL

A group of company peoples only know, but outside
peoples should not know like Personal Identification
Number (PIN)
CONFIDENTIAL
Data is used by limited number of private
users, and should not be known to the majority of
workers
SECREAT
Data is known by the very high authority persons
only. Lose of this data may cause critical damage to
the company.
SECURITY TYPES
 Physical Security

 Personal Security

 Operations Security

 Communications Security

 Network Security

 Information Security
.
PHYISCAL SECURITY
To protect Physical items, objects or areas
PERSONAL SECURITY

To protect the individual or group of individuals
who are authorized
OPERATION SECURITY
To protect the details of a particular operation or
activities
COMMUNICATION SECURITY
To protect communication media, technology and
content
NETWORK SECURITY
To protect networking components, connections
and contents
INFORMATION SECURITY

To protect information assets
THANK U

Más contenido relacionado

La actualidad más candente

what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)Ali Habeeb
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Information security principles an understanding
Information security principles an understandingInformation security principles an understanding
Information security principles an understandingHelpWithAssignment.com
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 

La actualidad más candente (20)

what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Network security
Network securityNetwork security
Network security
 
System security
System securitySystem security
System security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Information security principles an understanding
Information security principles an understandingInformation security principles an understanding
Information security principles an understanding
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Information security
Information securityInformation security
Information security
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 

Similar a Information Security Lecture #1 ppt

L2 - Protecting Security of Assets_.pptx
L2 - Protecting Security of Assets_.pptxL2 - Protecting Security of Assets_.pptx
L2 - Protecting Security of Assets_.pptxRebeccaMunasheChimhe
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2sharing notes123
 
WHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdf
WHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdfWHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdf
WHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdfSprintzeal
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
Infromation Assurance
Infromation AssuranceInfromation Assurance
Infromation AssuranceAkshay Pal
 
Protect Office 365 data on unmanaged devices.PDF
Protect Office 365 data on unmanaged devices.PDFProtect Office 365 data on unmanaged devices.PDF
Protect Office 365 data on unmanaged devices.PDFJoseph Glocke
 
Basic of Information Security
Basic of Information SecurityBasic of Information Security
Basic of Information SecurityPotato
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.pptAnuraagAwasthi3
 
Infromation securiity
Infromation securiityInfromation securiity
Infromation securiityAamir Sohail
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographicSectricity
 
Protecting the Healthcare Database
Protecting the Healthcare DatabaseProtecting the Healthcare Database
Protecting the Healthcare DatabaseSteve Dunn
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016 Mukesh Pathak
 

Similar a Information Security Lecture #1 ppt (20)

information security
information securityinformation security
information security
 
Data security
Data securityData security
Data security
 
L2 - Protecting Security of Assets_.pptx
L2 - Protecting Security of Assets_.pptxL2 - Protecting Security of Assets_.pptx
L2 - Protecting Security of Assets_.pptx
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
WHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdf
WHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdfWHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdf
WHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdf
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
Infromation Assurance
Infromation AssuranceInfromation Assurance
Infromation Assurance
 
Protect Office 365 data on unmanaged devices.PDF
Protect Office 365 data on unmanaged devices.PDFProtect Office 365 data on unmanaged devices.PDF
Protect Office 365 data on unmanaged devices.PDF
 
Basic of Information Security
Basic of Information SecurityBasic of Information Security
Basic of Information Security
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.ppt
 
Data security
Data securityData security
Data security
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
Infromation securiity
Infromation securiityInfromation securiity
Infromation securiity
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographic
 
Protecting the Healthcare Database
Protecting the Healthcare DatabaseProtecting the Healthcare Database
Protecting the Healthcare Database
 
Windows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITProsWindows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITPros
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016
 

Más de vasanthimuniasamy

Más de vasanthimuniasamy (20)

Lecture #1 - Introduction to Information System
Lecture #1 - Introduction to Information SystemLecture #1 - Introduction to Information System
Lecture #1 - Introduction to Information System
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Encryption
EncryptionEncryption
Encryption
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Wi MAX Technology
Wi MAX TechnologyWi MAX Technology
Wi MAX Technology
 
WiFi Technology & IEEE
WiFi Technology & IEEEWiFi Technology & IEEE
WiFi Technology & IEEE
 
WAP Technology
WAP TechnologyWAP Technology
WAP Technology
 
I - Mode Technology
I - Mode TechnologyI - Mode Technology
I - Mode Technology
 
Cellular Communication
Cellular CommunicationCellular Communication
Cellular Communication
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Computer Network PDF - Course Material 2013
Computer Network PDF - Course Material 2013Computer Network PDF - Course Material 2013
Computer Network PDF - Course Material 2013
 
Computer Wireless Network Pdf - course material 2013
Computer Wireless Network Pdf - course material 2013Computer Wireless Network Pdf - course material 2013
Computer Wireless Network Pdf - course material 2013
 
Smartcard lecture #5
Smartcard lecture #5Smartcard lecture #5
Smartcard lecture #5
 
Lecture #5 Data Communication and Network
Lecture #5 Data Communication and NetworkLecture #5 Data Communication and Network
Lecture #5 Data Communication and Network
 
Database Management System Lecture #4
Database Management System Lecture #4Database Management System Lecture #4
Database Management System Lecture #4
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
E - Commerce Lecture #3
E - Commerce Lecture #3 E - Commerce Lecture #3
E - Commerce Lecture #3
 

Último

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 

Último (20)

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 

Information Security Lecture #1 ppt