Professional Documents
Culture Documents
Introduction
In the last 20 years, technology has permeated every facet of
the business environment. The business place is no longer static
– it moves whenever employees travel from office to office,
from office to home, from city to city. Since business have
become more fluid, information security is no longer the sole
responsibility of a small dedicated group of professionals, it is
now the responsibility of every employee, especially
managers.”
1
Information Technology :- technology involving development
and use of computer systems and networks for the purpose of
processing and distribution of data
2
Information Security
types of security ?
1- Physical security:- is the protection of personnel,
hardware, software, networks and data
from physical actions and events that could cause serious
loss or damage to an enterprise, agency or institution. This
includes protection from fire, flood, natural disasters,
burglary, theft, vandalism and terrorism.
3
2- Digital security:- is an all-encompassing term which
includes the tools you can use to secure your identity, assets and
technology in the online and mobile world. These tools you can
use to protect your identity include anti-virus software, web
services, biometrics and secure personal devices you carry with
you everyday.
4
Information Security
• C.I.A. triangle:- 3 key characteristics of info.
that must be protected by information security
1- Confidentiality:-only authorized parties can view
information.
5
How to ensure data confidentiality?
1. Cryptography.
6
How to ensure data availability?
1. anti-DDoS system (Distribute deniel of service Attack).
7
CNSS = Committee on National Security Systems
CNSS Security Model
ink:
REFERENCES
https://www.geeksforgeeks.org/what-is-information-
security/
http://www.businessandleadership.com/fs/img/news/20
0811/378x/business-traveller.jpg
http://www.koolring.co.uk/wp-
content/uploads/2010/01/mobile-phones.jpg