You are on page 1of 32

Information

Assurance and
Security 1
Network The process of taking
preventative measures
security to keep the underlying
networking
infrastructure from
unauthorized access,
misuse, malfunction,
modification,
destruction or improper
disclosure
IMPORTANCE OF COMPUTER AND NETWORK SECURITY

Security is a critical part of


information systems and the need
for IT professionals who are
proficient and capable in
configuring systems in a secure
manner and are able to measure
security is on the rise.
Importance A. To secure
Network company asset
security
B. To gain a
competitive
advantage
C. To keep your
job
A. To secure company asset

Network security’s primary goal is to


secure and protect the asset of an
organization. An asset means a useful
or valuable thing for a company. It
includes both software and hardware
that the company owns and most
important, the information.
Importance A. To secure
Network company asset
security
B. To gain a
competitive
advantage
C. To keep your
job
B. To gain a competitive advantage

Competition among businesses


aims to boost for innovation. It can
lead them to invent new or better
products for their consumers or
even create more efficient
processes in providing good quality
of service.
Importance A. To secure
Network company asset
security
B. To gain a
competitive
advantage
C. To keep your
job
3.To keep your job

As a network administrator, it is your


job to protect the organizations
information. It is so important to have
and implement a very secured
network to avoid intruders damaging
or having an unauthorized access from
your network.
The
Security The Security Trinity

Trinity
The Security Trinity

This security trinity will help a


company to provide a better strategy
in keeping a data secured while
avoiding intruders to alter or steal such
information. It is the foundation of for
all security policies and measures that
an organization should consider.
The
Security The Security Trinity

Trinity
Detection

Network Detection is a security solution by


organization to detect any malicious
activity in a network. In times that
preventative measure fails, detections can
help an institution to protect their network
or system against malware threats, attacks
made not only by outsiders but including
insiders as well, credential abuse, and data
exfiltration.
The
Security The Security Trinity

Trinity
Response

During a cyber or network security


incidents, network administrator
whose job is to provide a good security
measures will face many unknown
activities inside the network. Thus,
organizations need to develop a plan
that identifies the most appropriate
response to any security breach.
The
Security The Security Trinity

Trinity
Prevention is Mandatory

Preventative measures are like the


gatekeepers of your organisation’s
digital fortress, keeping cyber
criminals at bay with strong
passwords, regular updates, and
modern security solutions.
Introduction
to
Information
Assurance
and Security 1
Confidentiality

Protect against unauthorized access to


information.
Confidentiality is often achieved via
encryption. Hackers in possession of
encrypted data can't read it without
the requisite decryption keys. File
permissions and access control lists
also ensure confidentiality.
Integrity

Protect against unauthorized


modification of information. Even if
an adversary can't read your data,
they can either corrupt it or
selectively modify it to cause further
damage later on.
Availability

Protect against denial of access to


information. Even if an adversary can't
access or modify your data, they can
prevent you from accessing it or using it.
For example, they can destroy or
congest communication lines, or bring
down the data server.
Introduction
to
Information
Assurance
and Security 1
Introduction
to
Information
Assurance
and Security 1
Introduction
to
Information
Assurance
and Security
1
Introduction
to
Information
Assurance
and Security
1
Introduction
to
Information
Assurance
and Security
1
Introduction
to
Information
Assurance
and Security
1
Introduction
to
Information
Assurance
and Security
1
Introduction
to
Information
Assurance
and Security
1
Introduction
to
Information
Assurance
and Security
1
Introduction
to
Information
Assurance
and Security
1
THANK YOU !

You might also like