SlideShare a Scribd company logo
An Introduction to
INFORMATION SECURITY
InfoSec-DAD
WHAT IS INFORMATION SECURITY?
Information security, sometimes shortened to infosec, is the practice of protecting INFORMATION by
mitigating information risks. It is part of INFORMATION RISK MANAGEMENT. It typically involves
preventing or reducing the probability of unauthorized/inappropriate access to DATA, or the unlawful
use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of
information
~WikiPedia
INFORMATION SECURITY – OSI LAYER
Every layer in OSI Layer shall have Security
Controls should include TRADITIONAL SECURITY
CONTROL & IMPROVE SECURITY CONTROL
DETECT
PREVENT
https://community.fs.com/blog/tcpip-vs-osi-whats-the-difference-between-the-two-models.html
INFORMATION SECURITY - OVERVIEW
End-user Web Application Server Database
Internet
INFORMATION SECURITY - OVERVIEW
End-user Web Application Server Database
Internet Internal Network
• Operating Systems
• Applications
• Software’s
• Personal
Information
• Banking
information’s
• Private Information
• Service Running
• Interface use to collect
information from the
user
• Display information of
the user
• Display functions to
perform transactions
• Process the information
Provided by the end-
user
• Send the information
to Server (Back-End)
• Operating Systems
• Running Application
• Running Services to
cater the Front-end to
perform its task
• Store the information
to database server
• System administrator
accounts
• Operating Systems
• Database server
• Client Information
• Database and system
Administrator accounts
BASIC CLASSIFICATION SCHEME
Commercial Classification
o Public – Information that me be
disclosed to anyone
o Proprietary – Organizational Processes
o Private – Customers, Partners
information
o Confidential – Vendors, Partners
contract, employee information
o Sensitive – Company Intellectual
Property
Government Classification
o Unclassified – Data that may be publicly
released with authorization
o Sensitive Unclassified – Data tagged
“For Official Use Only”
o Confidential – Data indicating strength
of ground forces
o Secret – select military plans
o Top Secret – cryptographic and
communications intelligence
Source: https://blog.netwrix.com/2020/09/02/data-classification/
HUMAN FACTORS
Visitor Access Communication
with strangers
Images from: https://www.e-sec.com/en-us/products/posters
you can buy posters to them for your security awareness campaign
Clean desk Public
Conversation
BYOD Presentation with
sensitive content
Classification of
Information
Leaving the
Office
DATA CLASSIFICATION PROCESS
Define the purpose
of data classification
Define the scope of
the data environment
Discover All in-scope
data
Define sensitivity
levels and classify the
data
Develop data
handling guidelines
Source: https://blog.netwrix.com/2020/09/02/data-classification/
WHAT IS THE BENEFITS?
1. You will able to identify the criticality of your systems
2. You will able to classify your information and to implement
proper security controls
3. It will help you manage your investment, you will know
what is your priority to secure
4. Build you cybersecurity enablement roadmap
5. Reduce the impact of any breach
THANK YOU!
IF YOU HAVE QUESTIONS,
PLEASE LEAVE YOUR QUESTIONS ON THE COMMENT SECTION, I WILL
ANSWER IT THE BEST AS I CAN

More Related Content

PDF
[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking
PDF
Git e GitHub - L'essenziale
PDF
Detection as Code - Effective Approach to manage & optimize SOC Development
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 1)
PPTX
Introduction to Incident Response Management
PDF
1. Security and Risk Management
PPTX
CISSP Domain 02 Asset Securitycissp.pptx
PPTX
Information Security
[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking
Git e GitHub - L'essenziale
Detection as Code - Effective Approach to manage & optimize SOC Development
CNIT 125: Ch 2. Security and Risk Management (Part 1)
Introduction to Incident Response Management
1. Security and Risk Management
CISSP Domain 02 Asset Securitycissp.pptx
Information Security

Similar to Basic of Information Security (20)

PDF
Notes prep guide
PPTX
What is Information Security and why you should care ...
PDF
(eBook PDF) Information Security: Principles and Practices 2nd Edition
PDF
Cissp Study notes.pdf
PPT
Testing
PPT
chapter 1. Introduction to Information Security
PPTX
Week 9- 1 information security slides.pptx
PDF
Business case for information security program
PDF
Business case for Information Security program
PPTX
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
PDF
1. Security and Risk Management
PPT
is_1_Introduction to Information Security
PDF
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
PPTX
Week 1 - Introduction to CyberSecurity.pptx
PDF
Information security planning session 1 2021
PDF
CISSP -Access Control Domain knowlege.pdf
PPT
Intro kavindu rasanjahshdjdhhjxjxuxgxjdjs
PPTX
information security
PPTX
Introduction to information security
PPT
Introduction to Information Security CSE
Notes prep guide
What is Information Security and why you should care ...
(eBook PDF) Information Security: Principles and Practices 2nd Edition
Cissp Study notes.pdf
Testing
chapter 1. Introduction to Information Security
Week 9- 1 information security slides.pptx
Business case for information security program
Business case for Information Security program
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
1. Security and Risk Management
is_1_Introduction to Information Security
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
Week 1 - Introduction to CyberSecurity.pptx
Information security planning session 1 2021
CISSP -Access Control Domain knowlege.pdf
Intro kavindu rasanjahshdjdhhjxjxuxgxjdjs
information security
Introduction to information security
Introduction to Information Security CSE
Ad

More from Potato (6)

PPTX
Understanding sql Injection
PPTX
Understanding dom based xss
PDF
Understanding CSRF
PDF
Cyber Security - ICCT Colleges
PDF
IOT Security - ICCT College of Engineering
PPTX
Web appsec and it’s 10 best SDLC practices
Understanding sql Injection
Understanding dom based xss
Understanding CSRF
Cyber Security - ICCT Colleges
IOT Security - ICCT College of Engineering
Web appsec and it’s 10 best SDLC practices
Ad

Recently uploaded (20)

PPTX
Layers_of_the_Earth_Grade7.pptx class by
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PDF
The Evolution of Traditional to New Media .pdf
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPT
Ethics in Information System - Management Information System
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
Internet Safety for Seniors presentation
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
E -tech empowerment technologies PowerPoint
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Layers_of_the_Earth_Grade7.pptx class by
Design_with_Watersergyerge45hrbgre4top (1).ppt
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
The Evolution of Traditional to New Media .pdf
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Ethics in Information System - Management Information System
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
Internet Safety for Seniors presentation
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
SASE Traffic Flow - ZTNA Connector-1.pdf
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
newyork.pptxirantrafgshenepalchinachinane
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
The New Creative Director: How AI Tools for Social Media Content Creation Are...
E -tech empowerment technologies PowerPoint
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...

Basic of Information Security

  • 1. An Introduction to INFORMATION SECURITY InfoSec-DAD
  • 2. WHAT IS INFORMATION SECURITY? Information security, sometimes shortened to infosec, is the practice of protecting INFORMATION by mitigating information risks. It is part of INFORMATION RISK MANAGEMENT. It typically involves preventing or reducing the probability of unauthorized/inappropriate access to DATA, or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information ~WikiPedia
  • 3. INFORMATION SECURITY – OSI LAYER Every layer in OSI Layer shall have Security Controls should include TRADITIONAL SECURITY CONTROL & IMPROVE SECURITY CONTROL DETECT PREVENT https://community.fs.com/blog/tcpip-vs-osi-whats-the-difference-between-the-two-models.html
  • 4. INFORMATION SECURITY - OVERVIEW End-user Web Application Server Database Internet
  • 5. INFORMATION SECURITY - OVERVIEW End-user Web Application Server Database Internet Internal Network • Operating Systems • Applications • Software’s • Personal Information • Banking information’s • Private Information • Service Running • Interface use to collect information from the user • Display information of the user • Display functions to perform transactions • Process the information Provided by the end- user • Send the information to Server (Back-End) • Operating Systems • Running Application • Running Services to cater the Front-end to perform its task • Store the information to database server • System administrator accounts • Operating Systems • Database server • Client Information • Database and system Administrator accounts
  • 6. BASIC CLASSIFICATION SCHEME Commercial Classification o Public – Information that me be disclosed to anyone o Proprietary – Organizational Processes o Private – Customers, Partners information o Confidential – Vendors, Partners contract, employee information o Sensitive – Company Intellectual Property Government Classification o Unclassified – Data that may be publicly released with authorization o Sensitive Unclassified – Data tagged “For Official Use Only” o Confidential – Data indicating strength of ground forces o Secret – select military plans o Top Secret – cryptographic and communications intelligence Source: https://blog.netwrix.com/2020/09/02/data-classification/
  • 7. HUMAN FACTORS Visitor Access Communication with strangers Images from: https://www.e-sec.com/en-us/products/posters you can buy posters to them for your security awareness campaign Clean desk Public Conversation BYOD Presentation with sensitive content Classification of Information Leaving the Office
  • 8. DATA CLASSIFICATION PROCESS Define the purpose of data classification Define the scope of the data environment Discover All in-scope data Define sensitivity levels and classify the data Develop data handling guidelines Source: https://blog.netwrix.com/2020/09/02/data-classification/
  • 9. WHAT IS THE BENEFITS? 1. You will able to identify the criticality of your systems 2. You will able to classify your information and to implement proper security controls 3. It will help you manage your investment, you will know what is your priority to secure 4. Build you cybersecurity enablement roadmap 5. Reduce the impact of any breach
  • 10. THANK YOU! IF YOU HAVE QUESTIONS, PLEASE LEAVE YOUR QUESTIONS ON THE COMMENT SECTION, I WILL ANSWER IT THE BEST AS I CAN