SlideShare a Scribd company logo
Security is
everyone’s responsibility
Information
Security
Overview
Ismaila Gassama
Objectives
 What is information security?
 Security goal CIA trial
 Security vulnerabilities threats and attacks
 Challenges to InfoSec
 How do we overcome to these problem
 Consequence of security Breach
Q&A
 Importance of Security
 Security vs safety
 Key Takeaways
Information systems security, more commonly referred to as
INFOSEC, by definition It is a set of business processes that
protects information assets regardless of how the information is
formatted or whether it is being processed, is in transit or is being
stored.
.
What is information security?
Security goal CIA trial
The purpose of computer security is to devise ways to prevent the
weaknesses from being exploited. To understand what preventive
measures make the most sense, we consider what we mean when
we say that a system is “secure.”
Talking About security goal , we are addressing three important
aspects of any computer- related system:
• Confidentiality
• Integrity
• Availability
Security goal CIA trial
• Confidentiality
Ensures that computer related assets are accessed only by
authorized parties.
• Integrity
Safeguard , the accuracy and completeness of information and
processing methods.
• Availability
Ensuring that authorized users have access to associated assets
when required.
Security goal CIA trial
Security Vulnerabilities, Threats and Attacks
Computer-based system has three separate but valuable
components: hardware, software and data. Each of these
assets offers value to different members of the community
affected by the system . we identify weaknesses in the system.
• Vulnerability, anything that leaves information
exposed to threat .
• Attack an action taken against a target with the intention
of doing harm ; it attempts to destroy , alert , disable ,
steal or gain authorized access to or make authorized use
of an asset.
• Threat is a set of circumstances that has the potential
to cause loss or harm.
Security Vulnerabilities, Threats and Attacks
Challenges of security
A number of trends illustrate why security is becoming increasingly
difficult:
 Speed of attacks
 Sophistication of attacks
 Faster detection of weaknesses
 Distributed attacks
 Difficulties of patching
Important of security
• The internet allows an attacker to attack from anywhere on the
planet.
• Risk caused by poor security knowledge and practice:
Identity theft
Monetary theft
Legal Ramifications ( staff and companies)
Termination if organization policies are not followed.
• According to www.SANS.org , the top vulnerabilities available
for cyber criminal are :
Web browser
IM clients
Web application
Excessive User Rights
Security vs Safety
• Security: We must protect our
computers and data in the
same way that we secure the
doors to our homes.
• Safety: We must behave in
ways that protect us against
risks and threats that come
with technology.
• Most of the practices are from the National
Institute of Standards and Technology
• Must use the practices at home and at work to
keep safe and secure (Security awareness).
• Employers should have policies and procedures
regarding secure practices. Be sure to understand
them and adhere to them. It will protect you, your
employer and your customers.
How do we overcome to these problems
Consequence of security Breach
Information security is “organizational problem “rather than
“IT problem “and the Consequence of security breach leads to:
 Reputation loss
Financial loss
Intellectual property loss
 loss Legislation
Loss of customers confidence
Loss of customers confidence
Eventually Loss of good will ……..
Key Takeaways:
• Objective of InfoSec is Confidentiality,
Integrity and Availability protect your systems
and your data
• Security should be applied in layers
• Security Awareness at all levels must be
maintained
• Failure to Secure is an Opportunity to Fail
Questions ?

More Related Content

PPTX
Information security challenges in today’s banking environment
PPTX
security and ethical challenges in information systems
PPTX
Introduction to information security
PPTX
System Security-Chapter 1
PPT
Information Security
PPT
Iss lecture 1
PPTX
Information security
PPT
Information security and other issues
Information security challenges in today’s banking environment
security and ethical challenges in information systems
Introduction to information security
System Security-Chapter 1
Information Security
Iss lecture 1
Information security
Information security and other issues

What's hot (20)

PPTX
Information security
PPT
Cyber security vs information assurance
PPTX
Introduction to Cybersecurity Fundamentals
PDF
1. introduction to cyber security
PPT
Introduction to information security
PPTX
Information security / Cyber Security ppt
PPTX
Information security
PPTX
An introduction to cyber security by cyber security infotech pvt ltd(csi)
PPT
Information security management
PPTX
IT_Security_Profile_Christina_McVeigh
PPTX
InformationSecurity
PPTX
Cyber security ppt
PPTX
INFORMATION SECURITY
PPTX
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
PPTX
Ceh intro
DOC
System Security Threats and Risks)
PPTX
IT security
PDF
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
PDF
Cyber Security vs.pdf
Information security
Cyber security vs information assurance
Introduction to Cybersecurity Fundamentals
1. introduction to cyber security
Introduction to information security
Information security / Cyber Security ppt
Information security
An introduction to cyber security by cyber security infotech pvt ltd(csi)
Information security management
IT_Security_Profile_Christina_McVeigh
InformationSecurity
Cyber security ppt
INFORMATION SECURITY
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Ceh intro
System Security Threats and Risks)
IT security
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Cyber Security vs.pdf
Ad

Viewers also liked (13)

PDF
Usability ≠ Accessibility. An intro to web accessibility for agencies.
PPTX
Moodle security
PPTX
Security Training: #1 What Actually a Security Is?
PPT
1 security goals
ODP
Network Security Topic 1 intro
PDF
Evaluating the Quality of Software in ERP Systems Using the ISO 9126 Model
DOCX
The CIA Triad - Assurance on Information Security
PPTX
Unit 8 software quality and matrices
PPTX
Computer software form 4
PPT
PROPRIETARY AND OPEN SOURCE SOFTWARE
PPT
Introduction to Software Licensing
PPTX
Basic concepts in computer security
PDF
Usability vs. User Experience: What's the difference?
Usability ≠ Accessibility. An intro to web accessibility for agencies.
Moodle security
Security Training: #1 What Actually a Security Is?
1 security goals
Network Security Topic 1 intro
Evaluating the Quality of Software in ERP Systems Using the ISO 9126 Model
The CIA Triad - Assurance on Information Security
Unit 8 software quality and matrices
Computer software form 4
PROPRIETARY AND OPEN SOURCE SOFTWARE
Introduction to Software Licensing
Basic concepts in computer security
Usability vs. User Experience: What's the difference?
Ad

Similar to Infosec (20)

PPTX
information security
PDF
Unit 1&2.pdf
PPTX
Review of Information Security Concepts
PPT
chapter 1. Introduction to Information Security
PPTX
Information Security and Privacy-Unit-1.pptx
PPTX
Information security FundameFundamentals.pptx
PPT
information security management
PPTX
1. Introduction to cybersecurity and information security
PPTX
02 fundamental aspects of security
PPTX
Introduction to Computer Security
PPTX
Lecture 01-Introduction to IIS Lecture note
PPTX
Network Security Basics in networking to learn
PPTX
Information security
PDF
information security introduction for campus students.pdf
DOCX
11What is Security 1.1 Introduction The central role of co.docx
PPTX
Information Security and Indian IT Act 2000
PPTX
Human Factors_MODULE_2.pptx
PDF
Chapter 12 iso 27001 awareness
PPT
Information Technology Security Basics
PDF
Fundamentals of Information Security..pdf
information security
Unit 1&2.pdf
Review of Information Security Concepts
chapter 1. Introduction to Information Security
Information Security and Privacy-Unit-1.pptx
Information security FundameFundamentals.pptx
information security management
1. Introduction to cybersecurity and information security
02 fundamental aspects of security
Introduction to Computer Security
Lecture 01-Introduction to IIS Lecture note
Network Security Basics in networking to learn
Information security
information security introduction for campus students.pdf
11What is Security 1.1 Introduction The central role of co.docx
Information Security and Indian IT Act 2000
Human Factors_MODULE_2.pptx
Chapter 12 iso 27001 awareness
Information Technology Security Basics
Fundamentals of Information Security..pdf

Infosec

  • 2. Objectives  What is information security?  Security goal CIA trial  Security vulnerabilities threats and attacks  Challenges to InfoSec  How do we overcome to these problem  Consequence of security Breach Q&A  Importance of Security  Security vs safety  Key Takeaways
  • 3. Information systems security, more commonly referred to as INFOSEC, by definition It is a set of business processes that protects information assets regardless of how the information is formatted or whether it is being processed, is in transit or is being stored. . What is information security?
  • 4. Security goal CIA trial The purpose of computer security is to devise ways to prevent the weaknesses from being exploited. To understand what preventive measures make the most sense, we consider what we mean when we say that a system is “secure.” Talking About security goal , we are addressing three important aspects of any computer- related system: • Confidentiality • Integrity • Availability
  • 5. Security goal CIA trial • Confidentiality Ensures that computer related assets are accessed only by authorized parties. • Integrity Safeguard , the accuracy and completeness of information and processing methods. • Availability Ensuring that authorized users have access to associated assets when required.
  • 7. Security Vulnerabilities, Threats and Attacks Computer-based system has three separate but valuable components: hardware, software and data. Each of these assets offers value to different members of the community affected by the system . we identify weaknesses in the system. • Vulnerability, anything that leaves information exposed to threat .
  • 8. • Attack an action taken against a target with the intention of doing harm ; it attempts to destroy , alert , disable , steal or gain authorized access to or make authorized use of an asset. • Threat is a set of circumstances that has the potential to cause loss or harm. Security Vulnerabilities, Threats and Attacks
  • 9. Challenges of security A number of trends illustrate why security is becoming increasingly difficult:  Speed of attacks  Sophistication of attacks  Faster detection of weaknesses  Distributed attacks  Difficulties of patching
  • 10. Important of security • The internet allows an attacker to attack from anywhere on the planet. • Risk caused by poor security knowledge and practice: Identity theft Monetary theft Legal Ramifications ( staff and companies) Termination if organization policies are not followed. • According to www.SANS.org , the top vulnerabilities available for cyber criminal are : Web browser IM clients Web application Excessive User Rights
  • 11. Security vs Safety • Security: We must protect our computers and data in the same way that we secure the doors to our homes. • Safety: We must behave in ways that protect us against risks and threats that come with technology.
  • 12. • Most of the practices are from the National Institute of Standards and Technology • Must use the practices at home and at work to keep safe and secure (Security awareness). • Employers should have policies and procedures regarding secure practices. Be sure to understand them and adhere to them. It will protect you, your employer and your customers. How do we overcome to these problems
  • 13. Consequence of security Breach Information security is “organizational problem “rather than “IT problem “and the Consequence of security breach leads to:  Reputation loss Financial loss Intellectual property loss  loss Legislation Loss of customers confidence Loss of customers confidence Eventually Loss of good will ……..
  • 14. Key Takeaways: • Objective of InfoSec is Confidentiality, Integrity and Availability protect your systems and your data • Security should be applied in layers • Security Awareness at all levels must be maintained • Failure to Secure is an Opportunity to Fail