Professional Documents
Culture Documents
INFORMATION SECURITY
PRESENTED BY:
Deepak Thapar
Paramjeet Singh
Puneet Takkar
TABLE OF CONTENTS
Introduction to Information Security.
History.
Objectives of Information Security.
Information Security Management.
Levels of Security.
Information Security Threats.
Information Security Tools.
Conclusion.
INTRODUCTION
• CONFIDENTIALITY
• INTEGRITY
• AVAILABILITY
INFORMATION SECURITY
MANAGEMENT
Information Security Management
consists of four steps:
LOW
MODERATE
HIGH
INFORMATION SECURITY
THREATS
Firewalls
Cryptography
Digital Signatures
Biometrics
CONCLUSION