Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
INTRODUCTION TO
INFORMATION
SECURITY
S.M. TOWHIDUL ISLAM, 181-35-2435
What is INFORMATION
SECURITY?
INFORMATION SECURITY
• Information security protects
the integrity and privacy of
data, both in storage and in
transit.
• Identifying information and
related assets, plus potential
threats, vulnerabilities, and
impacts.
• evaluating the risks;
INFORMATION TYPE
• Profile in social media
• Data in mobile phone
• Confidential organization
information
• Country secrets
• Mobile computing
• Bank information etc
• The largest security concerns at this interval were at the points of access. Anyone with enough knowledge about how to
work a computer could break into a facility and start accessing sensitive data. In order to secure terminals, passwords and
multiple layers of security protection were added to devices.
• At this point in the history of information security, network computing was in its infancy (the internet as we know it today
wouldn't exist until the end of the 1980s).
• By the 1980s, hacking had already burgeoned into an international crime issue. Limited information security systems could
not keep up with the constant barrage of clever approaches hackers used to break into computer systems. This fact became
extremely prominent.
• After the world wide web was made available in 1989, people started putting their personal information online; organized
crime entities saw this as a potential revenue source, and started to steal data from people and governments via the web.
• While governments had been pursuing cyber criminals for decades, most punishments were light, often being limited to
confiscation of computer equipment and a ban from computer use for a certain period of time.
• Although criminal prosecutions, firewalls and antivirus software had served as deterrents to cybercriminals, they did not stop
hackers who were skilled and bold enough to break into computer networks.
HISTORY OF INFORMATION
SECURITY
INFORMATION SECURITY
PRINCIPLES
NETWORK
SECURITY
• Network security is the practice of preventing
and protecting against unauthorized intrusion
into corporate networks.
• Network security is a broad term that covers a
multitude of technologies, devices and
processes.
• It is a set of rules and configurations designed
to protect the integrity, confidentiality and
accessibility of computer networks and data
using both software and hardware
technologies.
ACCURACY OF
INFORMATION
• Inaccurate data has real-world implications
across industries.
• In law enforcement, inaccurate data could mean
booking the wrong person for a crime.
• Data accuracy is no longer “just” a component
of data quality. It is quite literally the most
important characteristic that makes data
usable and purposeful.
CONCLUSION
• Every organization needs protection
against cyber attacks and security
threats.
• Cybercrime and malware are constant
threats to anyone with an Internet
presence, and data breaches are time-
consuming and expensive.
• The services of a trustworthy
information security provider will
mitigate digital information risks and
keep systems running without
disruption.
THANK YOU

More Related Content

Introduction to information security

  • 2. What is INFORMATION SECURITY? INFORMATION SECURITY • Information security protects the integrity and privacy of data, both in storage and in transit. • Identifying information and related assets, plus potential threats, vulnerabilities, and impacts. • evaluating the risks; INFORMATION TYPE • Profile in social media • Data in mobile phone • Confidential organization information • Country secrets • Mobile computing • Bank information etc
  • 3. • The largest security concerns at this interval were at the points of access. Anyone with enough knowledge about how to work a computer could break into a facility and start accessing sensitive data. In order to secure terminals, passwords and multiple layers of security protection were added to devices. • At this point in the history of information security, network computing was in its infancy (the internet as we know it today wouldn't exist until the end of the 1980s). • By the 1980s, hacking had already burgeoned into an international crime issue. Limited information security systems could not keep up with the constant barrage of clever approaches hackers used to break into computer systems. This fact became extremely prominent. • After the world wide web was made available in 1989, people started putting their personal information online; organized crime entities saw this as a potential revenue source, and started to steal data from people and governments via the web. • While governments had been pursuing cyber criminals for decades, most punishments were light, often being limited to confiscation of computer equipment and a ban from computer use for a certain period of time. • Although criminal prosecutions, firewalls and antivirus software had served as deterrents to cybercriminals, they did not stop hackers who were skilled and bold enough to break into computer networks. HISTORY OF INFORMATION SECURITY
  • 5. NETWORK SECURITY • Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. • Network security is a broad term that covers a multitude of technologies, devices and processes. • It is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies.
  • 6. ACCURACY OF INFORMATION • Inaccurate data has real-world implications across industries. • In law enforcement, inaccurate data could mean booking the wrong person for a crime. • Data accuracy is no longer “just” a component of data quality. It is quite literally the most important characteristic that makes data usable and purposeful.
  • 7. CONCLUSION • Every organization needs protection against cyber attacks and security threats. • Cybercrime and malware are constant threats to anyone with an Internet presence, and data breaches are time- consuming and expensive. • The services of a trustworthy information security provider will mitigate digital information risks and keep systems running without disruption.