Security
We must protect our Computers, Data and Information in the same way we secure the doors to our homes.
Why Security?
The “80/20” Rule
» 80% human factor
» 20% technical
Security Awareness
• Knowledge, Skill and Attitude an
individual possesses
• Being Security Conscious
• Individual Responsibility and
sufficient Understanding
• Awareness of Risks
Information Security
What is Information Security?
Keeping valuable information ‘free from danger’ (i.e., protected and safe
from misuse or unauthorized access )
It is not something we buy, it is something we do
It’s a process not a product
Why Information Security?
– people can work more effectively and
efficiently
– accurate information is accessed or made
available when required
– information is protected from theft,
misuse or use for fraudulent or irregular
transactions
– deterrent against incidences which may
cause reputational damage to the
organization
– provides proactive protection against
attacks on PCs (e.g., viruses, spywares,
malwares, phishing, and other malicious
activities)
Information Security Objectives
• Confidentiality
Information is ONLY available or disclosed to authorized
individuals, entities, or processes.
• Integrity
Safeguarding the accuracy and completeness
of information and reliability on processing
controls
• Availability
Ensuring that information is available when
required or needed
Key Factors in achieving CIA
• People
» Awareness
» Discipline
• Policy/Process/Procedure
» Clear
» Defined Coverage
» Compliance – Legal, Standards, Guidelines, etc.
• Technology
» Enablers
» Management Tools
Thanks for Read,
Please "SHARE" our post that your friends can read and learn and "COMMENT" us so that we can make our blog beautiful.
Please Follow us.
Facebook Profile
Twitter
Google+
Facebook Page
Youtube
E-mail
Subscribe to:
Post Comments (Atom)
Learn how hackers are stealing passwords to protect your own
Fixing the Leak: See How Hackers Are Stealing Your Passwords There is no way you are going to win a battle you are not prepared for. By pr...
-
Encryption Use encryption as prescribed in the Information Security Policies Use encrypted channels for on-line communications (HTTPS, ...
-
Social Engineering Be prepared for Social Engineering being skeptical than sorry. Be prepared to avoid a threat – be skeptical when it ...
No comments:
Post a Comment