PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.

Slides:



Advertisements
Similar presentations
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Advertisements

Security Controls – What Works
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Information Security Technological Security Implementation and Privacy Protection.
Security Operations. 2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Concepts of Database Management Sixth Edition
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer & Network Security
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Cryptography, Authentication and Digital Signatures
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Working with HIT Systems
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Chap1: Is there a Security Problem in Computing?.
Communication in Administration (Security)
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Database Security Carl J. Hoppe 20 November 2013.
Information Security and Privacy in HRIS
Information Security and Privacy By: Mike Battestilli.
Importance of IT security ->protects data ->ensures authentication and confidentiality ->preevents data theft.
Blackboard Security System
Security Of Information Systems
Key words: Secure | Password | Character
Design for Security Pepper.
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Security Design.
Domain 2 – Asset Security
Chapter 5 Electronic Commerce | Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Chapter 3: IRS and FTC Data Security Rules
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 5 Electronic Commerce | Security
برنامج أمن أنظمة الحاسب
Another perspective on Network Security
Security network management
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Cloud Storage-as-a-Service and Course Reflection
Introduction to the PACS Security
Cyber Security For Civil Engineering
Cryptography and Network Security
School of Medicine Orientation Information Security Training
Presentation transcript:

PRESENTED BY Raju

What is information security?  Information security is the process of protecting information. It protects its availability, privacy and integrity from unauthorized access, use, disclosure, disruption, modification or destruction.

Components  Confidentiality  Integrity  Availability

 Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems.  Integrity means that data cannot be modified without authorization.  Availability means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly.

Types Of Security  Data security  Computer security  Network security

Data Security  It is the means of ensuring that is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data.

Data Security Technologies Disk Encryption Backups Data Masking Data Erasure

 Data Encryption refers to encryption technology that encrypts data on a hard disk drive. Spoiled hard disk  Backups are used to ensure data which is lost can be recovered

 Data masking of structured data is the process of obscuring specific data within a database table or cell to ensure that data security is maintained and sensitive information is not exposed to unauthorized personnel.  Data Erasure is a method of software-based overwriting that completely destroys all electronic data residing on a hard drive or other digital media to ensure that no sensitive data is leaked when an asset is retired or reused.

Threat  There are people who make a living from hacking or breaking through information security systems.  They use their technological skills to break into computer systems and access private information.  Through Phishing.

Measures  Simple security measures can be used by everyone to keep data secure. Changing passwords on your computer, and using combinations of letters and numbers, makes it harder for hackers to gain access.  Technology implementing higher levels of information security, such as iris recognition systems, security systems should keep them out for a little longer.  Choosing Good Passwords.  Physical Security.  Avoid Phishing

Conclusion  It is the ongoing process of exercising due care and due diligence to protect information, and information systems, from unauthorized access, use, disclosure, destruction, modification, or disruption or distribution.  This never ending process involves ongoing training, assessment, protection, monitoring & detection, incident response & repair, documentation, and review.

THANK YOU

QUERIES ?