You are on page 1of 10

 Define information security.

 Principles of information security.


 Examples of sensitive data.
 Importance of information security.
 Famous security threats.
 Famous security attacks.
 How to protect your system?
Information security:

sometimes shortened to infosec, is the practice of protecting
INFORMATION by mitigating risks. It is part of INFORMATION
RISK MANAGEMENT. it typically involves preventing or reducing
the probability of unauthorized/inappropriate access to DATA, or
the unlawful use, disclosure, disruption, deletion, corruption,
modification, recording ,or devaluation of information,
Principles of Information security:
Confidentiality
Integrity
Availability
Examples of sensitive data:

Any kind of data that you dont want any one to


know about:
1. Your facebook account and messages.
2. Health and medical data.
3. Credit cards data in websites (online payment).
4. Company’s Employees information
5. Customer Information for any business.
Importance of information security:
Reducing Reducing the risk of data attacks in IT systems.

Applying Applying security controls to prevent unauthorized access to sensitive information

Preventing Preventing disruption of services, e.g, denial-of-service attacks.

Keeping Keeping downtime to a minimum so productivity stays high.

Ensuring Ensuring business continunity through data protection of information assets.

Providing Providing peace of mind by keeping confidential information safe from security threats.
Famous security threats.
PHISING

RANSOMWARE

DISTRIBUTED DENIAL OF SERVICE (DDoS)


Famous security attacks:

At 2009 Google china attacked by cyber attack

At 1999 teen hack NASA and US Defense Department.

At 2012 linkedin attacked by russian cybercrime

at 2018 GITHUB (DDoS) attacked.


How to protect your system?
Use Antivirus,Fire walls, anti Spyware
Use Complex Passwords
Apply penetration tests on your system to discover issues and fix them.
Use strong encryption for sensitive data.
Use trusted websites (like websites 551.)
Control physical acces to your computers and network components.
Train your employees in cyber security principles.
regular backups and hire a qualified IT team.
THANK YOU

You might also like