You are on page 1of 10

PRESENTATION ON INFORMATION SECURITY

PRESENTED BY: Deepak Thapar Paramjeet Singh Puneet Takkar

TABLE OF CONTENTS
Introduction to Information Security. History. Objectives of Information Security. Information Security Management. Levels of Security. Information Security Threats. Information Security Tools. Conclusion.

INTRODUCTION
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.

HISTORY
Persons desiring secure communications used wax seals and other sealing devices. Julius Caesar is credited with the invention of the Caesar cipher c50 B.C. World War II brought about many advancements in information security.

OBJECTIVES OF INFORMATION SECURITY


CONFIDENTIALITY INTEGRITY AVAILABILITY

INFORMATION SECURITY MANAGEMENT


Information Security Management consists of four steps: 1.Identifying the threats. 2.Defining the risks. 3.Establishing an information security policy. 4.Implementing controls.

LEVELS OF SECURITY
Three levels of security are: LOW MODERATE HIGH

INFORMATION SECURITY THREATS


Viruses and Worms. Spywares and Adwares. Rootkits. E-mail threats like Phishing and Spam. Hackers and Crackers. Website Defacement.

INFORMATION SECURITY TOOLS


Encryption Firewalls Cryptography Digital Signatures Biometrics

CONCLUSION

You might also like