Professional Documents
Culture Documents
ISM PPT Final
ISM PPT Final
Information Security
and its
Impact on Business
Information Security
Preservation of confidentiality, integrity and
What? availability of information.
15%
16% 44%
52%
10%
10%
81%
10% 16%
Human Error Dishonest People Current Employees Outsider Money Theft Theft of Information
Technical Sabotage Fire Theft of Services Damage to Software
Water Terrorism Former Employees
Alteration of Data Trespass
Security Threats
In computer security, a threat is a
potential negative action or event
facilitated by a vulnerability that
results in an unwanted impact to a
computer system or application.
A hacker who breaks into a A person who uses existing An ethical practice used to
computer system or network with computer scripts or codes to hack improve computer and internet
malicious intent to steal or destroy into computers and networks, systems such as security and
private data or shut down lacking the expertise to write their search engine optimization
websites and networks. own.
RISK MANAGEMENT
Implement Risk
Identify the Risk Management Prepare Red Alert
Plan
Imp ct
Probability
Reputational
Legal consequences
Business Continuity Planning
A business continuity plan details processes and
procedures that will help keep operations up and running
or restore them as quickly as possible in the event of a
major disaster, whether it be a physical disaster (e.g.,
extreme weather event) or a technological one (e.g.,
cyberattack).
Top Threats to Business Continuity:
Global pandemics
Natural disasters
Utility outages
Cybersecurity
4 Characteristics Guiding Your Continuity Planning:
Comprehensive
Realistic
Efficient
Adaptable
Summary and Conclusion
The protection of information and information systems from
unauthorized access.
Implemented on the
Safeguards the
organization’s IT
technology used
systems
Thank You !