You are on page 1of 1

Define STEP for Solving Problem

Specialized areas of Being safe. To be secure means to avoid loss, damage,


security (POCCN) unauthorised modification, and other risks. 1. Recognize and Define the Problem
2. Gather Facts and Make Assumption
hysical Security A multilayered system is also needed for an organization's
perations Security 3. Develop Possible Solutions
security. 4. Analyze and Compare Possible Solutions
ommunications Security
yber Security 5. Select, Implement, and Evaluate a Solutions
etwork Security

Management
Characteristics Principles Of Information
Characteristics C.I.A Information (POLC) Security Management
Triad (CIAPIAAAA) Security(InfoSec) lanning (6P)
It protects information organizing Planning
onfidentiality
ntegrity and its value, such as eading Policy
vailability confidentiality, integrity, ontrolling Programs
rivacy and availability (C.I.A). Protection
dentification Information is protected People
uthentication via policy, training, and Project Management
uthorization awareness programmes
accountability and technology.

Categories Threats
Compromises to intellectual Sabotage or vandalism TOPIC 1:
property
Deviations in quality of
Software attacks
Technical hardware failures INTRODUCTION
TO SECURITY
service or errors
Espionage or trespass Technical software failures
Forces of Nature or errors.
Human error or failure Technology obsolescence
Information extortion Theft

You might also like