SlideShare a Scribd company logo
1 of 26
Security and Internet security Jasmina Trajkovski [email_address]   ELSA Conference Strumica,  27.11.2008
Topics covered ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is Security and Information Security?
What is Security? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Information Security? ,[object Object],[object Object],[object Object],[object Object]
Critical Characteristics of Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 1-4 – NSTISSC Security Model NSTISSC Security Model
Culture of security
History ,[object Object],[object Object],[object Object],[object Object],[object Object]
Principles part 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Principles part 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Principles part 3 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Global Information Security Trends
Global information security survey 2008 – Ernst & Young 1/2 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Global information security survey 2008 – Ernst & Young 2/2 ,[object Object],[object Object],[object Object],[object Object]
Internet security
What is internet security ,[object Object],[object Object]
Our life on the internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Aspects that need security on the internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attach sophistication vs. Intruders knowledge
Best practices for information security for senior managers
Best practices – part 1 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Best practices – part 2 ,[object Object],[object Object],[object Object],[object Object]
Best practices – part 3 ,[object Object],[object Object]
[object Object],[object Object]

More Related Content

What's hot

Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.Ni
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWPICPE
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)BPalmer13
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01ITNet
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Securing information system
Securing information systemSecuring information system
Securing information systemTanjim Rasul
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Kinetic Potential
 
Evolution of Security
Evolution of SecurityEvolution of Security
Evolution of SecurityDM_GS
 

What's hot (20)

Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Topic11
Topic11Topic11
Topic11
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
 
Network security
Network securityNetwork security
Network security
 
Information security management
Information security managementInformation security management
Information security management
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
Cia security model
Cia security modelCia security model
Cia security model
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Information security
Information securityInformation security
Information security
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
12 security policies
12 security policies12 security policies
12 security policies
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
Evolution of Security
Evolution of SecurityEvolution of Security
Evolution of Security
 

Viewers also liked

Power point wikileaks
Power point wikileaksPower point wikileaks
Power point wikileaksdanna16
 
The Law of Whistleblowing
The Law of WhistleblowingThe Law of Whistleblowing
The Law of WhistleblowingKathleen Clark
 
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...Kathleen Clark
 
Wikileaks: the hacker's game
Wikileaks: the hacker's gameWikileaks: the hacker's game
Wikileaks: the hacker's gamemjneutel
 
What's the point about wikileaks?
What's the point about wikileaks?What's the point about wikileaks?
What's the point about wikileaks?Joris Berthelot
 
WikiLeaks Presentation
WikiLeaks PresentationWikiLeaks Presentation
WikiLeaks PresentationEmily Blegvad
 
Disclosure of wikileaks
Disclosure of wikileaksDisclosure of wikileaks
Disclosure of wikileaksSachin sharma
 
Report ethics in government service
Report ethics in government serviceReport ethics in government service
Report ethics in government serviceLouie Medinaceli
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaksMichael Zimmer
 

Viewers also liked (17)

What wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan SempleWhat wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan Semple
 
Power point wikileaks
Power point wikileaksPower point wikileaks
Power point wikileaks
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
The Law of Whistleblowing
The Law of WhistleblowingThe Law of Whistleblowing
The Law of Whistleblowing
 
WikiLeaks and Information Policy
WikiLeaks and Information PolicyWikiLeaks and Information Policy
WikiLeaks and Information Policy
 
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
 
Wikileaks: the hacker's game
Wikileaks: the hacker's gameWikileaks: the hacker's game
Wikileaks: the hacker's game
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
What's the point about wikileaks?
What's the point about wikileaks?What's the point about wikileaks?
What's the point about wikileaks?
 
WikiLeaks Presentation
WikiLeaks PresentationWikiLeaks Presentation
WikiLeaks Presentation
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Disclosure of wikileaks
Disclosure of wikileaksDisclosure of wikileaks
Disclosure of wikileaks
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
Report ethics in government service
Report ethics in government serviceReport ethics in government service
Report ethics in government service
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaks
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 

Similar to 2 Security And Internet Security

information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectIOSR Journals
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organizationMohammed Mahfouz Alhassan
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docxmoggdede
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsRd. R. Agung Trimanda
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas IlyasSundas Kayani
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...Dejan Jeremic
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...IRJET Journal
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk ManagementHamed Moghaddam
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 

Similar to 2 Security And Internet Security (20)

information security management
information security managementinformation security management
information security management
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
820 1961-1-pb
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and Controls
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 

More from Ana Meskovska

Assessing the institutionalisation of knowledge in an automotive factory at Fiat
Assessing the institutionalisation of knowledge in an automotive factory at FiatAssessing the institutionalisation of knowledge in an automotive factory at Fiat
Assessing the institutionalisation of knowledge in an automotive factory at FiatAna Meskovska
 
Stimulating management innovation through knowledge management
Stimulating management innovation through knowledge management Stimulating management innovation through knowledge management
Stimulating management innovation through knowledge management Ana Meskovska
 
E-educational games in formal education - Poster
E-educational games in formal education - PosterE-educational games in formal education - Poster
E-educational games in formal education - PosterAna Meskovska
 
E-educational games in formal education - ePrototype Bazaar 2011
E-educational games in formal education - ePrototype Bazaar 2011E-educational games in formal education - ePrototype Bazaar 2011
E-educational games in formal education - ePrototype Bazaar 2011Ana Meskovska
 
How to implement effective ITSM System
How to implement effective ITSM SystemHow to implement effective ITSM System
How to implement effective ITSM SystemAna Meskovska
 
Increasing trust towards governmental e-services
Increasing trust towards governmental e-servicesIncreasing trust towards governmental e-services
Increasing trust towards governmental e-servicesAna Meskovska
 
Increasing trust towards government e-services
Increasing trust towards government e-servicesIncreasing trust towards government e-services
Increasing trust towards government e-servicesAna Meskovska
 
Information Security for increased usage of e-services - Masit Open Days 2010
Information Security for increased usage of e-services - Masit Open Days  2010Information Security for increased usage of e-services - Masit Open Days  2010
Information Security for increased usage of e-services - Masit Open Days 2010Ana Meskovska
 
E-prototype bazaar - Makedonija
E-prototype bazaar - MakedonijaE-prototype bazaar - Makedonija
E-prototype bazaar - MakedonijaAna Meskovska
 
Proposal for cross border cooperation
Proposal for cross border cooperationProposal for cross border cooperation
Proposal for cross border cooperationAna Meskovska
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of InformationAna Meskovska
 
4 System For Information Security
4 System For Information Security4 System For Information Security
4 System For Information SecurityAna Meskovska
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On InternetAna Meskovska
 
Business Process Modeling
Business Process ModelingBusiness Process Modeling
Business Process ModelingAna Meskovska
 
ITSM Qualification Schemes
ITSM Qualification SchemesITSM Qualification Schemes
ITSM Qualification SchemesAna Meskovska
 
Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000Ana Meskovska
 
Integration of ICT Standards
Integration of ICT StandardsIntegration of ICT Standards
Integration of ICT StandardsAna Meskovska
 

More from Ana Meskovska (18)

Assessing the institutionalisation of knowledge in an automotive factory at Fiat
Assessing the institutionalisation of knowledge in an automotive factory at FiatAssessing the institutionalisation of knowledge in an automotive factory at Fiat
Assessing the institutionalisation of knowledge in an automotive factory at Fiat
 
Stimulating management innovation through knowledge management
Stimulating management innovation through knowledge management Stimulating management innovation through knowledge management
Stimulating management innovation through knowledge management
 
E-educational games in formal education - Poster
E-educational games in formal education - PosterE-educational games in formal education - Poster
E-educational games in formal education - Poster
 
E-educational games in formal education - ePrototype Bazaar 2011
E-educational games in formal education - ePrototype Bazaar 2011E-educational games in formal education - ePrototype Bazaar 2011
E-educational games in formal education - ePrototype Bazaar 2011
 
How to implement effective ITSM System
How to implement effective ITSM SystemHow to implement effective ITSM System
How to implement effective ITSM System
 
Increasing trust towards governmental e-services
Increasing trust towards governmental e-servicesIncreasing trust towards governmental e-services
Increasing trust towards governmental e-services
 
Increasing trust towards government e-services
Increasing trust towards government e-servicesIncreasing trust towards government e-services
Increasing trust towards government e-services
 
Information Security for increased usage of e-services - Masit Open Days 2010
Information Security for increased usage of e-services - Masit Open Days  2010Information Security for increased usage of e-services - Masit Open Days  2010
Information Security for increased usage of e-services - Masit Open Days 2010
 
E-prototype bazaar - Makedonija
E-prototype bazaar - MakedonijaE-prototype bazaar - Makedonija
E-prototype bazaar - Makedonija
 
Proposal for cross border cooperation
Proposal for cross border cooperationProposal for cross border cooperation
Proposal for cross border cooperation
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information
 
4 System For Information Security
4 System For Information Security4 System For Information Security
4 System For Information Security
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet
 
Business Process Modeling
Business Process ModelingBusiness Process Modeling
Business Process Modeling
 
ITSM Qualification Schemes
ITSM Qualification SchemesITSM Qualification Schemes
ITSM Qualification Schemes
 
Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000
 
Integration of ICT Standards
Integration of ICT StandardsIntegration of ICT Standards
Integration of ICT Standards
 

Recently uploaded

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Recently uploaded (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

2 Security And Internet Security

Editor's Notes

  1. What Is Security? In general, security is “the quality or state of being secure--to be free from danger.” It means to be protected from adversaries--from those who would do harm, intentionally or otherwise. What Is Security? A successful organization should have the following multiple layers of security in place for the protection of its operations: Physical security - to protect the physical items, objects, or areas of an organization from unauthorized access and misuse. Personal security – to protect the individual or group of individuals who are authorized to access the organization and its operations. Operations security – to protect the details of a particular operation or series of activities. Communications security – to protect an organization’s communications media, technology, and content. Network security – to protect networking components, connections, and contents.
  2. What Is Information Security? Information security, therefore, is the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information. But to protect the information and its related systems from danger, tools, such as policy, awareness, training, education, and technology are necessary. The C.I.A. triangle has been considered the industry standard for computer security since the development of the mainframe. It was solely based on three characteristics that described the utility of information: confidentiality, integrity, and availability. The C.I.A. triangle has expanded into a list of critical characteristics of information.
  3. Critical Characteristics Of Information The value of information comes from the characteristics it possesses. Availability - enables users who need to access information to do so without interference or obstruction and in the required format. The information is said to be available to an authorized user when and where needed and in the correct format. Accuracy- free from mistake or error and having the value that the end-user expects. If information contains a value different from the user’s expectations due to the intentional or unintentional modification of its content, it is no longer accurate. Authenticity - the quality or state of being genuine or original, rather than a reproduction or fabrication. Information is authentic when it is the information that was originally created, placed, stored, or transferred. Confidentiality - the quality or state of preventing disclosure or exposure to unauthorized individuals or systems. Integrity - the quality or state of being whole, complete, and uncorrupted. The integrity of information is threatened when the information is exposed to corruption, damage, destruction, or other disruption of its authentic state. Utility - the quality or state of having value for some purpose or end. Information has value when it serves a particular purpose. This means that if information is available, but not in a format meaningful to the end-user, it is not useful. Possession - the quality or state of having ownership or control of some object or item. Information is said to be in possession if one obtains it, independent of format or other characteristic. While a breach of confidentiality always results in a breach of possession, a breach of possession does not always result in a breach of confidentiality.
  4. This graphic informs the fundamental approach of the chapter and can be used to illustrate the intersection of information states (x-axis), key objectives of C.I.A. (y-axis) and the three primary means to implement (policy, education and technology).