You are on page 1of 10

PRESENTATION ON

INFORMATION SECURITY

PRESENTED BY:
Deepak Thapar
Paramjeet Singh
Puneet Takkar
TABLE OF CONTENTS
 Introduction to Information Security.
 History.
 Objectives of Information Security.
 Information Security Management.
 Levels of Security.
 Information Security Threats.
 Information Security Tools.
 Conclusion.
INTRODUCTION

Information security means protecting


information and information systems
from unauthorized access, use,
disclosure, disruption, modification or
destruction.
HISTORY

Persons desiring secure communications used wax


seals and other sealing devices.

Julius Caesar is credited with the invention of the


Caesar cipher c50 B.C.

World War II brought about many advancements in


information security.
OBJECTIVES OF
INFORMATION SECURITY

• CONFIDENTIALITY

• INTEGRITY

• AVAILABILITY
INFORMATION SECURITY
MANAGEMENT
Information Security Management
consists of four steps:

1.Identifying the threats.


2.Defining the risks.
3.Establishing an information security
policy.
4.Implementing controls.
LEVELS OF SECURITY
Three levels of security are: -

 LOW

 MODERATE

 HIGH
INFORMATION SECURITY
THREATS

 Viruses and Worms.


 Spywares and Adwares.
 Rootkits.
 E-mail threats like Phishing and Spam.
 Hackers and Crackers.
 Website Defacement.
INFORMATION SECURITY
TOOLS
 Encryption

 Firewalls

 Cryptography

 Digital Signatures

 Biometrics
CONCLUSION

You might also like