SlideShare a Scribd company logo
Information Security
Fundamentals
The Avi Sharma
Information Security
• Information Security refers to securing the data or
information and systems from unauthorized access
or misuses.
• Data of organizations are breached by scammers,
fraudsters or hackers and to stop them we have to
deal with information security.
Need for Security
• Development in information technology.
• Lack of knowledge and skills in field of security.
• Impact on data breaches on the organizations and
business corporates.
Elements of Security
• Confidentiality – only authorized users can access or
protection of data by preventing the
unauthorized access.
• Integrity – It refers to the accuracy and consistency
of data over its lifecycle.
• Availability – it means the information will be
available when it required for authorized users.
Elements of Security
• Non Repudiation – is the assurance that someone
cannot deny the validity of something.
Attacks in Info. Security
• Operating system attacks
Attackers find vulnerabilities in a operating system to
gain access to the system. In every operating system
vulnerabilities are present and the attackers take
advantages of it.
Attacks in Info. Security
• Mis – Configuration attacks –
Misconfiguration
attacks exploit configuration weaknesses found in
web and application servers. Many servers come
with unnecessary default and sample files, including
applications, configuration files, scripts, and
WebPages.
Attacks in Info. Security
• Application level attack –
An application attack consists of cyber criminals
gaining access to unauthorized areas. Attackers most
commonly start with a look at the application layer,
hunting for application vulnerabilities written within
code.
• Example – Man-in-middle ,session hijacking,DOS
attacks.
Info. Security Laws
• Payment Card Industry Data Security [PCI-DSS]
The Payment Card Industry Data Security Standard
(PCI DSS) is a set of requirements intended to ensure
that all companies that process, store, or
transmit credit card information maintain
a secure environment.
Info. Security Laws
• ISO/IEC 27001:2013
It specifies the requirements for establishing,
implementing, maintaining and continually improving
an information security management system within
the context of the organization.
Info. Security Laws
• Health Insurance Portability and Accountability Act
[HIPPA]
The Health Insurance Portability and Accountability
Act of 1996 (HIPAA) is a federal law that required the
creation of national standards to protect sensitive
patient health information from being disclosed
Info. Security Laws
• Sarbanes Oxley Act [SOX]
The Sarbanes-Oxley Act of 2002 is a law the U.S.
Congress passed on July 30 of that year to help
protect investors from fraudulent financial reporting
by corporations.
Info. Security Laws
• The Digital Millennium Copyright Act [DMCA]
Digital Millennium Copyright Act (DMCA), which
amended U.S. copyright law to address important
parts of the relationship between copyright and the
internet.
Thank You
The Avi Sharma
Cyber Security Expert

More Related Content

PDF
Report on Mobile security
PPT
Virtualization in Cloud Computing.ppt
PDF
computer-security-and-cryptography-a-simple-presentation
PPTX
User authentication
 
PPTX
Operating system security
PPTX
Virus and Worms
PPT
network printer.ppt
Report on Mobile security
Virtualization in Cloud Computing.ppt
computer-security-and-cryptography-a-simple-presentation
User authentication
 
Operating system security
Virus and Worms
network printer.ppt

What's hot (20)

PPTX
23 network security threats pkg
PPT
Wireless security presentation
PPTX
Password Policy and Account Lockout Policies
PPT
Multimedia networking
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Hacking and Anti Hacking
PPTX
Introduction to Intrusion detection and prevention system for network
PPTX
IT security
PDF
5 Things to Know about Safety and Security of Embedded Systems
PPTX
Ingeniería social
PPTX
One time password(otp)
PPTX
Email security
PPT
Information Assurance And Security - Chapter 1 - Lesson 2
PPTX
Melissa Virus
PDF
Recomendaciones básicas de seguridad en servidores y hosting
PDF
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
PPTX
Trusted systems1
PDF
PDF
Password Attacks.pdf
PDF
Secure by Design - Security Design Principles for the Rest of Us
23 network security threats pkg
Wireless security presentation
Password Policy and Account Lockout Policies
Multimedia networking
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Hacking and Anti Hacking
Introduction to Intrusion detection and prevention system for network
IT security
5 Things to Know about Safety and Security of Embedded Systems
Ingeniería social
One time password(otp)
Email security
Information Assurance And Security - Chapter 1 - Lesson 2
Melissa Virus
Recomendaciones básicas de seguridad en servidores y hosting
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Trusted systems1
Password Attacks.pdf
Secure by Design - Security Design Principles for the Rest of Us
Ad

Similar to Information Security Fundamentals (20)

PPTX
Cyber Security and data Security for all.pptx
PPTX
Lec 1- Intro to cyber security and recommendations
PPTX
Introduction of ethical hacking.........
PPTX
Information Security
PPTX
Cyber Sequrity.pptx is life of cyber security
PPTX
Presentation 1.pptx
PPTX
Data security
PDF
Information Security - Goals, Challenges, and Best Practices Discussed | USCSI®
PDF
Lecture 01 Information Security BS computer Science
PPTX
sec.This includes policy settings that prevent unauthorized people
PPTX
Cyber Security awareness of cyber security
PPTX
Software Security - Copy-1.pptx by sohab
PPTX
Management Information Systems ( Security and Control.pptx
PPTX
Information security: importance of having defined policy & process
PDF
Top Cyber Security Interview Questions and Answers 2022.pdf
PDF
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
PPTX
What is Cyber & information security.pptx
PPTX
Unit four .pptx
PDF
Introduction-to-Cyber-Security presentation.pdf
PDF
internet security and cyber lawUnit1
Cyber Security and data Security for all.pptx
Lec 1- Intro to cyber security and recommendations
Introduction of ethical hacking.........
Information Security
Cyber Sequrity.pptx is life of cyber security
Presentation 1.pptx
Data security
Information Security - Goals, Challenges, and Best Practices Discussed | USCSI®
Lecture 01 Information Security BS computer Science
sec.This includes policy settings that prevent unauthorized people
Cyber Security awareness of cyber security
Software Security - Copy-1.pptx by sohab
Management Information Systems ( Security and Control.pptx
Information security: importance of having defined policy & process
Top Cyber Security Interview Questions and Answers 2022.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What is Cyber & information security.pptx
Unit four .pptx
Introduction-to-Cyber-Security presentation.pdf
internet security and cyber lawUnit1
Ad

More from The Avi Sharma (6)

PPTX
Networking fundamentals
PPTX
Presentation on - Processors
PPTX
Robotics
PPTX
Sql injection
PPTX
BLUEJACKING
PPTX
Presentation on IOT SECURITY
Networking fundamentals
Presentation on - Processors
Robotics
Sql injection
BLUEJACKING
Presentation on IOT SECURITY

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation theory and applications.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Electronic commerce courselecture one. Pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Chapter 3 Spatial Domain Image Processing.pdf
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Reach Out and Touch Someone: Haptics and Empathic Computing
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
The AUB Centre for AI in Media Proposal.docx
Encapsulation theory and applications.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Electronic commerce courselecture one. Pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25 Week I
Spectral efficient network and resource selection model in 5G networks
Review of recent advances in non-invasive hemoglobin estimation
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
“AI and Expert System Decision Support & Business Intelligence Systems”
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

Information Security Fundamentals

  • 2. Information Security • Information Security refers to securing the data or information and systems from unauthorized access or misuses. • Data of organizations are breached by scammers, fraudsters or hackers and to stop them we have to deal with information security.
  • 3. Need for Security • Development in information technology. • Lack of knowledge and skills in field of security. • Impact on data breaches on the organizations and business corporates.
  • 4. Elements of Security • Confidentiality – only authorized users can access or protection of data by preventing the unauthorized access. • Integrity – It refers to the accuracy and consistency of data over its lifecycle. • Availability – it means the information will be available when it required for authorized users.
  • 5. Elements of Security • Non Repudiation – is the assurance that someone cannot deny the validity of something.
  • 6. Attacks in Info. Security • Operating system attacks Attackers find vulnerabilities in a operating system to gain access to the system. In every operating system vulnerabilities are present and the attackers take advantages of it.
  • 7. Attacks in Info. Security • Mis – Configuration attacks – Misconfiguration attacks exploit configuration weaknesses found in web and application servers. Many servers come with unnecessary default and sample files, including applications, configuration files, scripts, and WebPages.
  • 8. Attacks in Info. Security • Application level attack – An application attack consists of cyber criminals gaining access to unauthorized areas. Attackers most commonly start with a look at the application layer, hunting for application vulnerabilities written within code. • Example – Man-in-middle ,session hijacking,DOS attacks.
  • 9. Info. Security Laws • Payment Card Industry Data Security [PCI-DSS] The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements intended to ensure that all companies that process, store, or transmit credit card information maintain a secure environment.
  • 10. Info. Security Laws • ISO/IEC 27001:2013 It specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization.
  • 11. Info. Security Laws • Health Insurance Portability and Accountability Act [HIPPA] The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that required the creation of national standards to protect sensitive patient health information from being disclosed
  • 12. Info. Security Laws • Sarbanes Oxley Act [SOX] The Sarbanes-Oxley Act of 2002 is a law the U.S. Congress passed on July 30 of that year to help protect investors from fraudulent financial reporting by corporations.
  • 13. Info. Security Laws • The Digital Millennium Copyright Act [DMCA] Digital Millennium Copyright Act (DMCA), which amended U.S. copyright law to address important parts of the relationship between copyright and the internet.
  • 14. Thank You The Avi Sharma Cyber Security Expert