SlideShare a Scribd company logo
Information Security
Index.



1.General concepts of Information Security
2.CISO (Chief Information Security Officer)
3.Certifications related to Information Security
  3.1. CISSP
  3.2. CISA,
  3.3. Security+
What is security?


Information security is defined as
“protecting information and information systems
from unauthorized access, use, disclosure,
disruption, modification, or destruction”
When Are We Secure?


Are we secure if our systems are properly patched?
Are we secure if we use strong passwords?
Are we secure if we are disconnected from the
Internet entirely?
When Are We Secure?


From a certain point of view, all of these questions
can be answered with a “NO”
Confidentiality, Integrity, and Availability Triad


When we discuss security issues, it is often helpful to
have a model that we can use as a foundation or a
baseline. This model is Confidentiality, Integrity, and
Availability (CIA) triad model.
Confidentiality, Integrity, and Availability Triad
CISO


Chief Information Security Officer (CISO) is the
senior-level executive within
an organization responsible for establishing and
maintaining the enterprise vision, strategy and
program to ensure information assets are adequately
protected.
Certifications related to Information Security


1) CISSP - The Certified ISS Professional
2) CISM - Certified Information Security Manager
3) CSSLP - Certified Secure Software Lifecycle
  Professional
4) SSCP - Systems Security Certified Practitioner
5) ISSAP – ISS Architecture Professional
6) ISSEP - ISS Engineering Professional
7) ISSMP - ISS Management Professional
CISSP


•The CISSP is known as the "gold standard" of
security certifications.

•It is governed by the International ISS Certification
Consortium or (ISC)2.
(ISC)2


The International Information Systems Security
Certification Consortium, also known as(ISC)2, is a
global, not-for-profit leader in educating and
certifying information security professionals.
At last
Information Security
Şamil Mehdiyev
Thank you for attention 

More Related Content

PPTX
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
PDF
Developing And Connecting Cybersecurity Leaders Globally
PDF
Cybersaftey (1)
PPTX
Information security
PPTX
Infromation securiity
PPT
Information Systems Security: Security Management, Metrics, Frameworks and Be...
PDF
Office365 Security Task Force
PPTX
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Developing And Connecting Cybersecurity Leaders Globally
Cybersaftey (1)
Information security
Infromation securiity
Information Systems Security: Security Management, Metrics, Frameworks and Be...
Office365 Security Task Force
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7

What's hot (19)

DOCX
The Role of Information Security Policy
ODT
Ch.5 rq (1)
DOC
Computer Security Policy
PDF
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
PDF
Active Directory: Modern Threats, Medieval Protection
PPTX
ASIS International Collaborating on Security Awareness Standard
PPTX
Introduction to Cybersecurity Fundamentals
PPTX
Getting Started in Information Security
PDF
Acronis Active Protection: A Way To Combat Ransomware Attack
PPTX
Information security challenges in today’s banking environment
PPT
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
PPT
information security management
PDF
Introduction to security
PPTX
Information security management (bel g. ragad)
PPT
Information Assurance And Security - Chapter 1 - Lesson 1
PPTX
Infromation Assurance
PPTX
ISO 27001 Certification in Dubai
PDF
Hacker Academy UK Booklet
The Role of Information Security Policy
Ch.5 rq (1)
Computer Security Policy
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
Active Directory: Modern Threats, Medieval Protection
ASIS International Collaborating on Security Awareness Standard
Introduction to Cybersecurity Fundamentals
Getting Started in Information Security
Acronis Active Protection: A Way To Combat Ransomware Attack
Information security challenges in today’s banking environment
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
information security management
Introduction to security
Information security management (bel g. ragad)
Information Assurance And Security - Chapter 1 - Lesson 1
Infromation Assurance
ISO 27001 Certification in Dubai
Hacker Academy UK Booklet
Ad

Viewers also liked (6)

PPTX
Information security fasit-cait-20150129_v04
PPT
Chief information security officer kpi
PPT
Is awareness government
PDF
Chief Information Security Officer - A Critical Leadership Role
PDF
Roles of Information Security Officers in State Government
PDF
Transforming Information Security: Designing a State-of-the-Art Extended Team
 
Information security fasit-cait-20150129_v04
Chief information security officer kpi
Is awareness government
Chief Information Security Officer - A Critical Leadership Role
Roles of Information Security Officers in State Government
Transforming Information Security: Designing a State-of-the-Art Extended Team
 
Ad

Similar to Information Security (20)

PDF
Contrast & Compare & Contrast Information Security Roles
PDF
1678784047-mid_sem-2.pdf
PDF
1 info sec+risk-mgmt
PDF
cissp-course content.pdf & cissp description
PDF
CISSP _Course _Description and course overview
PPTX
Presentation 1.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Advanced Operating System Principles.pptx
PPTX
Information security[277]
PPTX
Information Security introduction and management.pptx
PDF
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
PPTX
Optimizing Security Operations: 5 Keys to Success
PDF
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
PDF
CISSO Certification | CISSO Training | CISSO
PPTX
Ch01_MoIS5e_v02.pptx business business business business
PDF
CISSP Certification Training Course
PDF
Solve the exercise in security management.pdf
PDF
2020 FRSecure CISSP Mentor Program - Class 2
PDF
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
PDF
Slide Deck - CISSP Mentor Program Class Session 1
Contrast & Compare & Contrast Information Security Roles
1678784047-mid_sem-2.pdf
1 info sec+risk-mgmt
cissp-course content.pdf & cissp description
CISSP _Course _Description and course overview
Presentation 1.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
Advanced Operating System Principles.pptx
Information security[277]
Information Security introduction and management.pptx
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
Optimizing Security Operations: 5 Keys to Success
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
CISSO Certification | CISSO Training | CISSO
Ch01_MoIS5e_v02.pptx business business business business
CISSP Certification Training Course
Solve the exercise in security management.pdf
2020 FRSecure CISSP Mentor Program - Class 2
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
Slide Deck - CISSP Mentor Program Class Session 1

Information Security

  • 2. Index. 1.General concepts of Information Security 2.CISO (Chief Information Security Officer) 3.Certifications related to Information Security 3.1. CISSP 3.2. CISA, 3.3. Security+
  • 3. What is security? Information security is defined as “protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction”
  • 4. When Are We Secure? Are we secure if our systems are properly patched? Are we secure if we use strong passwords? Are we secure if we are disconnected from the Internet entirely?
  • 5. When Are We Secure? From a certain point of view, all of these questions can be answered with a “NO”
  • 6. Confidentiality, Integrity, and Availability Triad When we discuss security issues, it is often helpful to have a model that we can use as a foundation or a baseline. This model is Confidentiality, Integrity, and Availability (CIA) triad model.
  • 7. Confidentiality, Integrity, and Availability Triad
  • 8. CISO Chief Information Security Officer (CISO) is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy and program to ensure information assets are adequately protected.
  • 9. Certifications related to Information Security 1) CISSP - The Certified ISS Professional 2) CISM - Certified Information Security Manager 3) CSSLP - Certified Secure Software Lifecycle Professional 4) SSCP - Systems Security Certified Practitioner 5) ISSAP – ISS Architecture Professional 6) ISSEP - ISS Engineering Professional 7) ISSMP - ISS Management Professional
  • 10. CISSP •The CISSP is known as the "gold standard" of security certifications. •It is governed by the International ISS Certification Consortium or (ISC)2.
  • 11. (ISC)2 The International Information Systems Security Certification Consortium, also known as(ISC)2, is a global, not-for-profit leader in educating and certifying information security professionals.
  • 14. Şamil Mehdiyev Thank you for attention 