Information security involves protecting data by mitigating risks. It aims to prevent unauthorized access, use, disclosure, disruption, corruption or loss of information. Key principles are confidentiality, integrity and availability. Sensitive data includes personal information like health records, financial details, and customer data. The importance of information security is to reduce risks of attacks, prevent unauthorized access, ensure business continuity and provide peace of mind. Common threats are phishing, ransomware and DDoS attacks. To protect systems, one should use antivirus software, firewalls, strong passwords, encryption, trusted websites and control physical access while training employees and hiring IT professionals.
Information security involves protecting data by mitigating risks. It aims to prevent unauthorized access, use, disclosure, disruption, corruption or loss of information. Key principles are confidentiality, integrity and availability. Sensitive data includes personal information like health records, financial details, and customer data. The importance of information security is to reduce risks of attacks, prevent unauthorized access, ensure business continuity and provide peace of mind. Common threats are phishing, ransomware and DDoS attacks. To protect systems, one should use antivirus software, firewalls, strong passwords, encryption, trusted websites and control physical access while training employees and hiring IT professionals.
Information security involves protecting data by mitigating risks. It aims to prevent unauthorized access, use, disclosure, disruption, corruption or loss of information. Key principles are confidentiality, integrity and availability. Sensitive data includes personal information like health records, financial details, and customer data. The importance of information security is to reduce risks of attacks, prevent unauthorized access, ensure business continuity and provide peace of mind. Common threats are phishing, ransomware and DDoS attacks. To protect systems, one should use antivirus software, firewalls, strong passwords, encryption, trusted websites and control physical access while training employees and hiring IT professionals.
Examples of sensitive data. Importance of information security. Famous security threats. Famous security attacks. How to protect your system? Information security: sometimes shortened to infosec, is the practice of protecting INFORMATION by mitigating risks. It is part of INFORMATION RISK MANAGEMENT. it typically involves preventing or reducing the probability of unauthorized/inappropriate access to DATA, or the unlawful use, disclosure, disruption, deletion, corruption, modification, recording ,or devaluation of information, Principles of Information security: Confidentiality Integrity Availability Examples of sensitive data:
Any kind of data that you dont want any one to
know about: 1. Your facebook account and messages. 2. Health and medical data. 3. Credit cards data in websites (online payment). 4. Company’s Employees information 5. Customer Information for any business. Importance of information security: Reducing Reducing the risk of data attacks in IT systems.
Applying Applying security controls to prevent unauthorized access to sensitive information
Preventing Preventing disruption of services, e.g, denial-of-service attacks.
Keeping Keeping downtime to a minimum so productivity stays high.
Ensuring Ensuring business continunity through data protection of information assets.
Providing Providing peace of mind by keeping confidential information safe from security threats. Famous security threats. PHISING
RANSOMWARE
DISTRIBUTED DENIAL OF SERVICE (DDoS)
Famous security attacks:
At 2009 Google china attacked by cyber attack
At 1999 teen hack NASA and US Defense Department.
At 2012 linkedin attacked by russian cybercrime
at 2018 GITHUB (DDoS) attacked.
How to protect your system? Use Antivirus,Fire walls, anti Spyware Use Complex Passwords Apply penetration tests on your system to discover issues and fix them. Use strong encryption for sensitive data. Use trusted websites (like websites 551.) Control physical acces to your computers and network components. Train your employees in cyber security principles. regular backups and hire a qualified IT team. THANK YOU