Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)

Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
information security?

.doc   infor-security.doc (Size: 153.5 KB / Downloads: 100)
1. What is information security?
Information security in today’s enterprise is a “well-informed sense of assurance that the information risks and controls are in balance.” –Jim Anderson, Inovant (2002)
• The protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information
• Tools, such as policy, awareness, training, education, and technology are necessary
2. What is C.I.A?
The C.I.A. triangle was the standard based on confidentiality, integrity, and availability. The C.I.A. triangle has expanded into a list of critical characteristics of information
3. Write a note on the history of information security
Computer security began immediately after the first mainframes were developed
Groups developing code-breaking computations during World War II created the first modern computers
Physical controls were needed to limit access to authorized personnel to sensitive military locations
Only rudimentary controls were available to defend against physical theft, espionage, and sabotage
4. What is Rand Report R-609?
Information Security began with Rand Corporation Report R-609, The Rand Report was the first widely recognized published document to identify the role of management and policy issues in computer security.
5. What is the scope of computer security?
The scope of computer security grew from physical security to include:
a. Safety of the data
b. Limiting unauthorized access to that data
c. Involvement of personnel from multiple levels of the organization
6. What is Security?
• “The quality or state of being secure--to be free from danger”
• To be protected from adversaries
7. Define Physical security
Physical Security – to protect physical items, objects or areas of organization from unauthorized access and misuse
8. Define Personal Security
Personal Security involves protection of individuals or group of individuals who are authorized to access the organization and its operations
9. Define Operations security
Operations security focuses on the protection of the details of particular operations or series of activities.
10. Define Communications security
Communications security – encompasses the protection of organization’s communications media, technology and content
11. Define Network security
Network security – is the protection of networking components,connections,and contents
12. Define Information security
Information security – is the protection of information and its critical elements, including the systems and hardware that use ,store, and transmit the information

.pptx   information security presentation.pptx (Size: 150.57 KB / Downloads: 70)
What is information security?
Information security is the process of protecting information. It protects its availability, privacy and integrity from unauthorized access, use, disclosure,  disruption, modification or destruction.
Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems.
Integrity means that data cannot be modified without authorization.
Availability means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly.
Types Of Security
Data security
Computer security
Network security
Data Security
It is the means of ensuring that is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data.
Data Security Technologies
Disk Encryption
Data Masking
Data Erasure
Data Encryption refers to encryption technology that encrypts data on a hard disk drive.
Spoiled hard disk
Backups are used to ensure data which is lost can be recovered
Data masking of structured data is the process of obscuring specific data within a database table or cell to ensure that data security is maintained and sensitive information is not exposed to unauthorized personnel.
Data Erasure is a method of software-based overwriting that completely destroys all electronic data residing on a hard drive or other digital media to ensure that no sensitive data is leaked when an asset is retired or reused.
There are people who make a living from hacking or breaking through information security systems.
They use their technological skills to break into computer systems and access private information.
Through Phishing.
Simple security measures can be used by everyone to keep data secure. Changing passwords on your computer, and using combinations of letters and numbers, makes it harder for hackers to gain access.
Technology implementing higher levels of information security, such as iris recognition systems, security systems should keep them out for a little longer.
Choosing Good Passwords.
Physical Security.
Avoid Phishing
It is the ongoing process of exercising due care and due diligence to protect information, and information systems, from unauthorized access, use, disclosure, destruction, modification, or disruption or distribution.
This never ending process involves ongoing training, assessment, protection, monitoring & detection, incident response & repair, documentation, and review.

to get information about the topic INFORMATION SECURITY full report ,ppt and related topic refer the link bellow
thanks for this information
Information security, sometimes abbreviated to InfoSec, is the practice of preventing unauthorised access to, use, disclosure, interruption, modification, inspection, registration or destruction of information. It is a general term that can be used regardless of the form the data can take (eg, electronic, physical).
Informatic security
Sometimes refers to computer security, information technology security is information security applied to technology (most of the time some form of computer system). It is worth noting that a computer does not necessarily mean a home desk. A computer is any device with a processor and some memory. Such devices can range from stand-alone non-networked devices, as simple as calculators, to networked mobile computing devices such as smartphones and tablet computers. IT security specialists are almost always found in any large enterprise / establishment due to the nature and value of data within large companies. They are responsible for keeping all technology within the enterprise safe from malicious cyber attacks that often attempt to breach critical private information or gain control of internal systems.
Infosec programs are built around the core objectives of the CIA triad: maintaining the confidentiality, integrity, and availability of IT systems and business data. These objectives ensure that confidential information is only disclosed to the authorised parties (confidentiality), prevents unauthorised modification of the data (integrity) and ensures that the data can be accessed by the authorised parties when requested (availability).

Many large companies employ a dedicated security group to implement and maintain the infosec program of the organisation. Typically, this group is headed by a head of information security. The security group is generally responsible for carrying out risk management, a process whereby vulnerabilities and threats to information assets are continuously evaluated and appropriate protection controls are decided upon and applied. The value of an organisation is within your information - your security is critical to business operations, as well as retaining credibility and gaining the trust of customers.

Threats to confidential and confidential information come in many different forms, such as malware and phishing attacks, identity theft and ransom-ware. To deter attackers and mitigate vulnerabilities at multiple points, multiple security controls are deployed and coordinated as part of a layered defence strategy. This should minimise the impact of an attack. To be prepared for a security breach, security groups must have an incident response plan (IRP) in place. This should allow them to contain and limit damage, eliminate the cause, and apply up-to-date defence controls.

Marked Categories : quotes from the rand report r 609, critical characteristics of information security ppt, security that addresses the protection of an organizational communications media technology and content, rand report r 609 computer security ppt, critical characteristics of information, critical characteristics of information security, define thread in information security, rand report r 609 pdf, backups data encryption data masking and data erasure are components of, information security documentation, find importance of network security in a corporate organization, rand report on information security, information security seminar topics, information security,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Last Post: study tips
  information technology seminar class 1 85,905 16-04-2011, 03:19 PM
Last Post: mickamark
This Page May Contain What is information security? And Latest Information/News About information security?,If Not ...Use Search to get more info about information security? Or Ask Here