information security?
#1

[attachment=11142]
1. What is information security?
Information security in today’s enterprise is a “well-informed sense of assurance that the information risks and controls are in balance.” –Jim Anderson, Inovant (2002)
• The protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information
• Tools, such as policy, awareness, training, education, and technology are necessary
2. What is C.I.A?
The C.I.A. triangle was the standard based on confidentiality, integrity, and availability. The C.I.A. triangle has expanded into a list of critical characteristics of information
3. Write a note on the history of information security
Computer security began immediately after the first mainframes were developed
Groups developing code-breaking computations during World War II created the first modern computers
Physical controls were needed to limit access to authorized personnel to sensitive military locations
Only rudimentary controls were available to defend against physical theft, espionage, and sabotage
4. What is Rand Report R-609?
Information Security began with Rand Corporation Report R-609, The Rand Report was the first widely recognized published document to identify the role of management and policy issues in computer security.
5. What is the scope of computer security?
The scope of computer security grew from physical security to include:
a. Safety of the data
b. Limiting unauthorized access to that data
c. Involvement of personnel from multiple levels of the organization
6. What is Security?
• “The quality or state of being secure--to be free from danger”
• To be protected from adversaries
7. Define Physical security
Physical Security – to protect physical items, objects or areas of organization from unauthorized access and misuse
8. Define Personal Security
Personal Security involves protection of individuals or group of individuals who are authorized to access the organization and its operations
9. Define Operations security
Operations security focuses on the protection of the details of particular operations or series of activities.
10. Define Communications security
Communications security – encompasses the protection of organization’s communications media, technology and content
11. Define Network security
Network security – is the protection of networking components,connections,and contents
12. Define Information security
Information security – is the protection of information and its critical elements, including the systems and hardware that use ,store, and transmit the information
Reply
#2
PRESENTED BY
Raju

[attachment=15440]
INFORMATION SECURITY
What is information security?
Information security is the process of protecting information. It protects its availability, privacy and integrity from unauthorized access, use, disclosure,  disruption, modification or destruction.
Components
Confidentiality
Integrity
Availability
Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems.
Integrity means that data cannot be modified without authorization.
Availability means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly.
Types Of Security
Data security
Computer security
Network security
Data Security
It is the means of ensuring that is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data.
Data Security Technologies
Disk Encryption
Backups
Data Masking
Data Erasure
Data Encryption refers to encryption technology that encrypts data on a hard disk drive.
Spoiled hard disk
Backups are used to ensure data which is lost can be recovered
Data masking of structured data is the process of obscuring specific data within a database table or cell to ensure that data security is maintained and sensitive information is not exposed to unauthorized personnel.
Data Erasure is a method of software-based overwriting that completely destroys all electronic data residing on a hard drive or other digital media to ensure that no sensitive data is leaked when an asset is retired or reused.
Threat
There are people who make a living from hacking or breaking through information security systems.
They use their technological skills to break into computer systems and access private information.
Through Phishing.
Measures
Simple security measures can be used by everyone to keep data secure. Changing passwords on your computer, and using combinations of letters and numbers, makes it harder for hackers to gain access.
Technology implementing higher levels of information security, such as iris recognition systems, security systems should keep them out for a little longer.
Choosing Good Passwords.
Physical Security.
Avoid Phishing
Conclusion
It is the ongoing process of exercising due care and due diligence to protect information, and information systems, from unauthorized access, use, disclosure, destruction, modification, or disruption or distribution.
This never ending process involves ongoing training, assessment, protection, monitoring & detection, incident response & repair, documentation, and review.
Reply
#3


to get information about the topic INFORMATION SECURITY full report ,ppt and related topic refer the page link bellow
http://studentbank.in/report-information...anizations

http://studentbank.in/report-information...ity--20424

http://studentbank.in/report-information...al-hacking

http://studentbank.in/report-information...ndpractice

http://studentbank.in/report-information...are-system

http://studentbank.in/report-information...nd-attacks

http://studentbank.in/report-information...ity--10205

http://studentbank.in/report-information...ganography
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: jim anderson inovant,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  information technology seminar class 1 3,001 16-04-2011, 03:19 PM
Last Post: mickamark

Forum Jump: