SlideShare a Scribd company logo
2
Most read
8
Most read
9
Most read
Information
Flow
ArfanShahzad.c
• Information flow is the exchange of information among
people, processes and systems within an organization.
• When you have employees working across different locations,
devices and departments, it can be difficult to keep
everyone on the same page.
• It’s very important to know information flow, for information
security.
Information Flow
cont…
Downwar
d
Upwar
d
Diagon
al
Horizont
al
ArfanShahzad.c
• The main types of information flow
include:
Information Flow cont…
Web systems
ArfanShahzad.c
Information Flow cont…
Information Flow
Diagram
ArfanShahzad.c
Information Flow cont…
Controlling Information
flow
ArfanShahzad.c
• Information Flow Control (IFC) is a mechanism in which a
system may
track data movement from one location to another.
• It's a security technique that keeps track of information flow
between a system and the rest of the world (Internet).
Information Flow cont…
Controlling Information
flow
• Users want their credentials to remain private.
• Access control has traditionally been
the primary technique for stopping information from
being spread.
• Access control, on the other hand, is
insufficient in many instances since it demands
an all-or-nothing.
ArfanShahzad.c
Information Flow cont…
Controlling Information
flow
ArfanShahzad.c
• Data Classification: Information is classified into different
categories or levels based on its sensitivity. Common
classifications include public, internal, confidential, and
highly confidential.
• Data Flow Policies: Systems implement policies that define
how data can flow from one location or process to another.
These policies are typically based on the labels assigned to
Information Flow cont…
Controlling Information
flow
ArfanShahzad.c
• Information Tracking: Information flow control mechanisms
track the movement of data throughout the system. This
tracking helps ensure that data is handled appropriately.
• Data Sanitization: When data is declassified or downgraded,
it may need to be sanitized to remove sensitive
information. This process ensures that lower-level users
do not gain access to classified data.
Information Flow cont…
Controlling Information
flow
ArfanShahzad.c
• Audit and Compliance: Information flow control mechanisms
often include auditing capabilities to track and log data
movements for compliance and forensic purposes.

More Related Content

PDF
Information Security 01- Basic Notions of Confidentiality Integrity Availabil...
PPT
Information security.pptx
PDF
TOR Packet Analysis - Locating Identifying Markers
PPTX
Access Control List (ACL)
PPTX
Network security
PDF
Wireless Hacking
PPTX
Intrusion detection
 
PPTX
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Information Security 01- Basic Notions of Confidentiality Integrity Availabil...
Information security.pptx
TOR Packet Analysis - Locating Identifying Markers
Access Control List (ACL)
Network security
Wireless Hacking
Intrusion detection
 
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...

What's hot (20)

PPTX
Man in the middle attack (mitm)
PPTX
Types of Cyber Attacks
PDF
Web security 2012
PDF
REST API Authentication Methods.pdf
PPTX
DOCX
The CIA Triad - Assurance on Information Security
PPTX
Wireless Penetration Testing
PDF
Transport Layer Security
PPTX
Security Measures
PDF
Network security chapter 1
PPTX
HTTPS
PPTX
The CIA triad.pptx
PPT
Synchronization in distributed systems
PPTX
Optimistic concurrency control in Distributed Systems
PPTX
System security
PPTX
Ethical hacking ppt
PPT
TCP/IP Network ppt
PPTX
Firewall basics
Man in the middle attack (mitm)
Types of Cyber Attacks
Web security 2012
REST API Authentication Methods.pdf
The CIA Triad - Assurance on Information Security
Wireless Penetration Testing
Transport Layer Security
Security Measures
Network security chapter 1
HTTPS
The CIA triad.pptx
Synchronization in distributed systems
Optimistic concurrency control in Distributed Systems
System security
Ethical hacking ppt
TCP/IP Network ppt
Firewall basics
Ad

Similar to Information Security 16- Information Flow.pdf (20)

PDF
The Science Of Quantitative Information Flow Mário S. Alvim
PPT
Context Fabric: Privacy Support for Ubiquitous Computing
PDF
Course Session Outline - Internal control in Information System
PPT
Accounting information systems overview of business processes
PPT
Accounting Information Systems; Basic Concept
PDF
Self-Protecting Information for De-Perimiterised Electronic Relationships
PPTX
Business Needs First.pptx
PPTX
PPTX
Pp 02-new
PPTX
Information awareness program
PPTX
Threat from within
PPT
13.4 information and data
PPTX
Access control Week 1
PPTX
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
DOCX
2018-FALL-MAIN-ISOL534-22-23-COMBINED - 2018_FALL_MAIN_APPLICA.docx
PPTX
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
PPTX
PPTX
Pp 01-AIS CHP 1
PPTX
Information filtering
PPTX
Chapter-2 (1).pptx
The Science Of Quantitative Information Flow Mário S. Alvim
Context Fabric: Privacy Support for Ubiquitous Computing
Course Session Outline - Internal control in Information System
Accounting information systems overview of business processes
Accounting Information Systems; Basic Concept
Self-Protecting Information for De-Perimiterised Electronic Relationships
Business Needs First.pptx
Pp 02-new
Information awareness program
Threat from within
13.4 information and data
Access control Week 1
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
2018-FALL-MAIN-ISOL534-22-23-COMBINED - 2018_FALL_MAIN_APPLICA.docx
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
Pp 01-AIS CHP 1
Information filtering
Chapter-2 (1).pptx
Ad

More from faiziikanwal47 (18)

PDF
01A_Niyyat-Ka-Maani-Awr-Ahmiyya6666t.pdf
PDF
Cloud Computing Models.uututuutututtuutut
PPTX
1602984149-1-introduction.pptx4hjdqehjeg
PPTX
1602984229-2-req-engg-process.pptxj89009
PPT
lecture9-190719030941 globalized availab
PPTX
Ch5 System modeling globally availabless
PDF
Information Security 20- Risk Assessment.pdf
PDF
Information Security 10- Network Security.pdf
PDF
Information Security 07- Audit.pdnjn;pp[pf
PDF
Information Security 06- Hashing and Digital Signatures.pdf
PDF
Information Security 05- Encryption.pdfn
PDF
information security Lecture by cyber security
PDF
market side business mind side to get enough
PDF
information security by cryptography sid
PDF
Information Security (Protection Model _ Access Control ).pdf
PDF
Information Security 08- Intrusion Detection and Response (1).pdf
PPT
12Outlier.for software introductionalism
PPT
CurrieTesting. in engineering field relevant
01A_Niyyat-Ka-Maani-Awr-Ahmiyya6666t.pdf
Cloud Computing Models.uututuutututtuutut
1602984149-1-introduction.pptx4hjdqehjeg
1602984229-2-req-engg-process.pptxj89009
lecture9-190719030941 globalized availab
Ch5 System modeling globally availabless
Information Security 20- Risk Assessment.pdf
Information Security 10- Network Security.pdf
Information Security 07- Audit.pdnjn;pp[pf
Information Security 06- Hashing and Digital Signatures.pdf
Information Security 05- Encryption.pdfn
information security Lecture by cyber security
market side business mind side to get enough
information security by cryptography sid
Information Security (Protection Model _ Access Control ).pdf
Information Security 08- Intrusion Detection and Response (1).pdf
12Outlier.for software introductionalism
CurrieTesting. in engineering field relevant

Recently uploaded (20)

PPTX
AD Bungalow Case studies Sem 2.pptxvwewev
PPTX
HPE Aruba-master-icon-library_052722.pptx
PPTX
Special finishes, classification and types, explanation
PPTX
An introduction to AI in research and reference management
PDF
Interior Structure and Construction A1 NGYANQI
PPTX
Implications Existing phase plan and its feasibility.pptx
PDF
High-frequency high-voltage transformer outline drawing
PPT
pump pump is a mechanism that is used to transfer a liquid from one place to ...
PDF
Integrated-2D-and-3D-Animation-Bridging-Dimensions-for-Impactful-Storytelling...
PPT
Machine printing techniques and plangi dyeing
PDF
Urban Design Final Project-Context
PPTX
BSCS lesson 3.pptxnbbjbb mnbkjbkbbkbbkjb
PPTX
DOC-20250430-WA0014._20250714_235747_0000.pptx
PPT
EGWHermeneuticsffgggggggggggggggggggggggggggggggg.ppt
PDF
Benefits_of_Cast_Aluminium_Doors_Presentation.pdf
PDF
Wio LTE JP Version v1.3b- 4G, Cat.1, Espruino Compatible\202001935, PCBA;Wio ...
PPTX
mahatma gandhi bus terminal in india Case Study.pptx
PDF
UNIT 1 Introduction fnfbbfhfhfbdhdbdto Java.pptx.pdf
PDF
GREEN BUILDING MATERIALS FOR SUISTAINABLE ARCHITECTURE AND BUILDING STUDY
PDF
SEVA- Fashion designing-Presentation.pdf
AD Bungalow Case studies Sem 2.pptxvwewev
HPE Aruba-master-icon-library_052722.pptx
Special finishes, classification and types, explanation
An introduction to AI in research and reference management
Interior Structure and Construction A1 NGYANQI
Implications Existing phase plan and its feasibility.pptx
High-frequency high-voltage transformer outline drawing
pump pump is a mechanism that is used to transfer a liquid from one place to ...
Integrated-2D-and-3D-Animation-Bridging-Dimensions-for-Impactful-Storytelling...
Machine printing techniques and plangi dyeing
Urban Design Final Project-Context
BSCS lesson 3.pptxnbbjbb mnbkjbkbbkbbkjb
DOC-20250430-WA0014._20250714_235747_0000.pptx
EGWHermeneuticsffgggggggggggggggggggggggggggggggg.ppt
Benefits_of_Cast_Aluminium_Doors_Presentation.pdf
Wio LTE JP Version v1.3b- 4G, Cat.1, Espruino Compatible\202001935, PCBA;Wio ...
mahatma gandhi bus terminal in india Case Study.pptx
UNIT 1 Introduction fnfbbfhfhfbdhdbdto Java.pptx.pdf
GREEN BUILDING MATERIALS FOR SUISTAINABLE ARCHITECTURE AND BUILDING STUDY
SEVA- Fashion designing-Presentation.pdf

Information Security 16- Information Flow.pdf

  • 1. Information Flow ArfanShahzad.c • Information flow is the exchange of information among people, processes and systems within an organization. • When you have employees working across different locations, devices and departments, it can be difficult to keep everyone on the same page. • It’s very important to know information flow, for information security.
  • 3. Information Flow cont… Web systems ArfanShahzad.c
  • 4. Information Flow cont… Information Flow Diagram ArfanShahzad.c
  • 5. Information Flow cont… Controlling Information flow ArfanShahzad.c • Information Flow Control (IFC) is a mechanism in which a system may track data movement from one location to another. • It's a security technique that keeps track of information flow between a system and the rest of the world (Internet).
  • 6. Information Flow cont… Controlling Information flow • Users want their credentials to remain private. • Access control has traditionally been the primary technique for stopping information from being spread. • Access control, on the other hand, is insufficient in many instances since it demands an all-or-nothing. ArfanShahzad.c
  • 7. Information Flow cont… Controlling Information flow ArfanShahzad.c • Data Classification: Information is classified into different categories or levels based on its sensitivity. Common classifications include public, internal, confidential, and highly confidential. • Data Flow Policies: Systems implement policies that define how data can flow from one location or process to another. These policies are typically based on the labels assigned to
  • 8. Information Flow cont… Controlling Information flow ArfanShahzad.c • Information Tracking: Information flow control mechanisms track the movement of data throughout the system. This tracking helps ensure that data is handled appropriately. • Data Sanitization: When data is declassified or downgraded, it may need to be sanitized to remove sensitive information. This process ensures that lower-level users do not gain access to classified data.
  • 9. Information Flow cont… Controlling Information flow ArfanShahzad.c • Audit and Compliance: Information flow control mechanisms often include auditing capabilities to track and log data movements for compliance and forensic purposes.