SlideShare une entreprise Scribd logo
1  sur  19
Basics of information
 Computer security
 Data
 Data security
 Information
 Information security
 Network security
Information system
 Information
 It is a resource fundamental to the success of any
business.
 Data
 Knowledge
 Action
Information Security
 Need and importance of information
 Damage to information can cause disruptions in a
normal process .
 Management is crucial to making good business
decision.
 Monitor and document the operations of other systems.
 To satisfy the decision making capability.
Information Systems
 Reasons for Information Classification
 Protection of personal data
 Protection of confidential data
 Protecting Intellectual property
 Protecting info. That supports public security and law
enforcement
 Supporting routine disclosure and active dissemination
 Data of intergovernmental cooperation and integrated
service delivery.
Information Classification
 Criteria of information classification
 Value
 Age
 Useful Life
 Personal association
Information Classification
 Levels of information classification
 Unclassified
 Sensitive But Unclassified
 Confidential
 Secrete
 Top secret
security
 Security means to protect information or system from
unauthorized users.
 Layers of security
 Physical security
 Personal Security
 Operational Security
 Communications security
 Network security
 Information security
security
 Need of security
 Application were developed to handle financial and
personal data
 Mechanism
 Use userid and paswword
 Encode information present in database
Security basics
 Basics of computer security /Three pillars of IS
includes :
 Confidentiality
 Integrity
 Availability
Security basics
 Confidentiality
 Confidentiality means secrecy or concealment of
information and resources.
 Attempt to prevent the intentional or unintentional
unauthorized disclosure of information.
 Interception attack
 Uses identification and authentication.
Security basics
 Confidentiality
 Breaches of confidentiality
 Permitting someone to look over your shoulder
 If the information containing device is stolen or sold
 Giving out the confidential information over communication
media.
 Mechanism used for confidentiality
 Resource hiding,
 cryptography,
 access control mechanism.
Security basics
 Integrity
 It involves maintaining the consistency, accuracy, and
trustworthiness of data over its entire life cycle.
 Data integrity and origin integrity.
 Modification attack
 Breaches of Integrity
 Accidentally or with malicious intent deletes information
 Computer virus
 Mechanism used for Integrity
 file permissions
 user access control
 cryptography
Security basics
 Availability
 Resources should be available to authorized parties at all
times.
 Availability is an important aspect of reliability as well as
of system design
 Interruption attack
 High availability systems aim to remain available at all
times(24x7) preventing service disruptions
 DOS(denial-of-service) attack.
Security basics
 Non-repudiation :
 It refers to the ability to ensure that a party to a contract or a
communication cannot deny the authenticity of their signature
on a document or the sending of a message that they
originated.
 The best services for non repudiation are digital signature and
encryption.
 Authorization
 Authorization is a process of verifying that a known person has
the authority to perform a certain operation.
Security basics
 Authentication :
 It is the process of determining the identity of a user or
other entity.
 It requires to access secure data or enter a secure area.
 Three method of authentication.
 Something –you-know : user ID and password.
 Something – you – have: lock and key.
 Something –about –you : finger print, DNA , Samples etc.
Data obfuscation
 Data obfuscation (DO) is a form of data masking where
data is purposely scrambled to prevent unauthorized
access to sensitive materials.
 Used to prevent the intrusion of private and sensitive
online data.
 Sensitive info. : Employee data(salary info , review
info.),customer data, bank and vendor data
Data obfuscation
 Techniques for data obfuscation
 Generate RSA(Rivest Shamir Adleman) private / public
key pair
 Masking
 Character scrambling or masking out of certain fields
 Substitution
 another authentic looking value can be substituted for the
existing value
 Purge
 applying a null value to a particular field
Event Classification
 Viruses
 Disaster
 Crisis
 Catastrophe

Contenu connexe

Tendances

Information security management system
Information security management systemInformation security management system
Information security management system
Arani Srinivasan
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 

Tendances (20)

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
System security
System securitySystem security
System security
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Network Security
Network SecurityNetwork Security
Network Security
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Cia security model
Cia security modelCia security model
Cia security model
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 

En vedette

Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
Shu Shin
 

En vedette (11)

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 

Similaire à Introduction to information security

CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
Mohsin Ahmad
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdf
annaielectronicsvill
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
ismaelhaider
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 

Similaire à Introduction to information security (20)

Data security
Data securityData security
Data security
 
Data security
Data securityData security
Data security
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Cyber security
Cyber securityCyber security
Cyber security
 
security IDS
security IDSsecurity IDS
security IDS
 
Information and network security ins
Information and network security insInformation and network security ins
Information and network security ins
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdf
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
Information security principles
Information security principlesInformation security principles
Information security principles
 
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxModule 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptx
 

Plus de jayashri kolekar (13)

FILE MANAGEMENT.pptx
FILE MANAGEMENT.pptxFILE MANAGEMENT.pptx
FILE MANAGEMENT.pptx
 
Architectural modeling chapter 5 of omd
Architectural modeling chapter 5 of omdArchitectural modeling chapter 5 of omd
Architectural modeling chapter 5 of omd
 
Advanced behavioral modeling chapter 4 of omd
Advanced behavioral modeling chapter 4 of omdAdvanced behavioral modeling chapter 4 of omd
Advanced behavioral modeling chapter 4 of omd
 
Basic behavioral modeling chapter 3 of OMD
Basic behavioral modeling chapter 3 of OMDBasic behavioral modeling chapter 3 of OMD
Basic behavioral modeling chapter 3 of OMD
 
Object oriented modeling and design
Object oriented modeling and designObject oriented modeling and design
Object oriented modeling and design
 
OMD chapter 2 Class modelling
 OMD  chapter 2 Class modelling OMD  chapter 2 Class modelling
OMD chapter 2 Class modelling
 
Macro
MacroMacro
Macro
 
Parsing
ParsingParsing
Parsing
 
Loader
LoaderLoader
Loader
 
Assembler1
Assembler1Assembler1
Assembler1
 
Cryptography
CryptographyCryptography
Cryptography
 
System programming
System programmingSystem programming
System programming
 
Compilers
CompilersCompilers
Compilers
 

Dernier

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Dernier (20)

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 

Introduction to information security

  • 1.
  • 2. Basics of information  Computer security  Data  Data security  Information  Information security  Network security
  • 3. Information system  Information  It is a resource fundamental to the success of any business.  Data  Knowledge  Action
  • 4. Information Security  Need and importance of information  Damage to information can cause disruptions in a normal process .  Management is crucial to making good business decision.  Monitor and document the operations of other systems.  To satisfy the decision making capability.
  • 5. Information Systems  Reasons for Information Classification  Protection of personal data  Protection of confidential data  Protecting Intellectual property  Protecting info. That supports public security and law enforcement  Supporting routine disclosure and active dissemination  Data of intergovernmental cooperation and integrated service delivery.
  • 6. Information Classification  Criteria of information classification  Value  Age  Useful Life  Personal association
  • 7. Information Classification  Levels of information classification  Unclassified  Sensitive But Unclassified  Confidential  Secrete  Top secret
  • 8. security  Security means to protect information or system from unauthorized users.  Layers of security  Physical security  Personal Security  Operational Security  Communications security  Network security  Information security
  • 9. security  Need of security  Application were developed to handle financial and personal data  Mechanism  Use userid and paswword  Encode information present in database
  • 10. Security basics  Basics of computer security /Three pillars of IS includes :  Confidentiality  Integrity  Availability
  • 11. Security basics  Confidentiality  Confidentiality means secrecy or concealment of information and resources.  Attempt to prevent the intentional or unintentional unauthorized disclosure of information.  Interception attack  Uses identification and authentication.
  • 12. Security basics  Confidentiality  Breaches of confidentiality  Permitting someone to look over your shoulder  If the information containing device is stolen or sold  Giving out the confidential information over communication media.  Mechanism used for confidentiality  Resource hiding,  cryptography,  access control mechanism.
  • 13. Security basics  Integrity  It involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle.  Data integrity and origin integrity.  Modification attack  Breaches of Integrity  Accidentally or with malicious intent deletes information  Computer virus  Mechanism used for Integrity  file permissions  user access control  cryptography
  • 14. Security basics  Availability  Resources should be available to authorized parties at all times.  Availability is an important aspect of reliability as well as of system design  Interruption attack  High availability systems aim to remain available at all times(24x7) preventing service disruptions  DOS(denial-of-service) attack.
  • 15. Security basics  Non-repudiation :  It refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated.  The best services for non repudiation are digital signature and encryption.  Authorization  Authorization is a process of verifying that a known person has the authority to perform a certain operation.
  • 16. Security basics  Authentication :  It is the process of determining the identity of a user or other entity.  It requires to access secure data or enter a secure area.  Three method of authentication.  Something –you-know : user ID and password.  Something – you – have: lock and key.  Something –about –you : finger print, DNA , Samples etc.
  • 17. Data obfuscation  Data obfuscation (DO) is a form of data masking where data is purposely scrambled to prevent unauthorized access to sensitive materials.  Used to prevent the intrusion of private and sensitive online data.  Sensitive info. : Employee data(salary info , review info.),customer data, bank and vendor data
  • 18. Data obfuscation  Techniques for data obfuscation  Generate RSA(Rivest Shamir Adleman) private / public key pair  Masking  Character scrambling or masking out of certain fields  Substitution  another authentic looking value can be substituted for the existing value  Purge  applying a null value to a particular field
  • 19. Event Classification  Viruses  Disaster  Crisis  Catastrophe