SlideShare a Scribd company logo
What is Information
Security and its
types?
Information security has been
assigned to look after the
protection of records and data
of organizations from
unauthorized access.
www.ecadema.com
Confidentiality
Focusing that the information couldn’t
be disclosed to any unauthorized
individuals, entities, and processes,
breaching confidentiality is taken care
of at a top-notch level.
www.ecadema.com
Integrity
Focusing on maintaining the accuracy and
entirety of the data. Suppose an employee of a
particular department left the organization
then all other departments will be informed
about the “job left” status so that data is
complete and accurate and in addition to this
only authorized persons should be allowed to
edit employee data.
www.ecadema.com
Availability
Whenever needed, data should be available and accessible to
authorized personalities to run the work process in a smooth
way. In case, one needs access to an employee’s profile and
working credentials, it requires collaboration from different
organizational teams like network operations, development
operations, incident response, and policy/change management.
www.ecadema.com
Non-repudiation
means that there couldn’t be any denial of sending or receiving the messages or
transactions. For instance, in cryptography, messages that match the digital
signature signed with the sender’s private key and that sender could have sent a
message and nobody else could have altered it in transit is sufficient.
www.ecadema.com
Authenticity
It claims the verification of the
users’ profile and the information
provided by the employee to be
true or not and its source. This
principle guarantees the validity of
the message source.
www.ecadema.com
Thank you!
Address- 651 N Broad St, Middletown
Middletown, DE 19709, United States
Mail id - ecadema0@gmail.com
Website - www.ecadema.com

More Related Content

PDF
Information Security Career Day Presentation
PPTX
Information Security and Indian IT Act 2000
DOCX
Office automation system
PPT
Information security
PPT
Chapter 3: Information Security Framework
PPTX
Week 9- 1 information security slides.pptx
PPT
information security management
PPT
informtion_security_standards_and_methods.ppt
Information Security Career Day Presentation
Information Security and Indian IT Act 2000
Office automation system
Information security
Chapter 3: Information Security Framework
Week 9- 1 information security slides.pptx
information security management
informtion_security_standards_and_methods.ppt

Similar to What is information security and its types (20)

PDF
Management Information Systems
PPT
it-security.ppt
PPTX
ISM-CS5750-01.pptx
PDF
it2042-unit1.pd AIM To study the critical need for ensuring Information Secu...
PDF
Fundamentals of Information Systems Security
PDF
Information Security at the Workplace
PPTX
Information security[277]
PPT
Data+security+sp10
PPTX
Lecture-1 about programming language.pptx
PPTX
ISMS Awareness Training (2) (1).pptx
DOCX
Unit 1 Information Security.docx
PPT
Information System Security introduction
PDF
For our discussion question, we focus on recent trends in security t.pdf
PPTX
Information security
PPT
Testing
PPT
CompTIA Security+ Module1: Security fundamentals
PPTX
CS5300 class presentation on managing information systems
PDF
Chapter1 Information and Network Security
PPTX
information system and infor,ation management .pptx
PPT
Ais Romney 2006 Slides 08 Is Control2
Management Information Systems
it-security.ppt
ISM-CS5750-01.pptx
it2042-unit1.pd AIM To study the critical need for ensuring Information Secu...
Fundamentals of Information Systems Security
Information Security at the Workplace
Information security[277]
Data+security+sp10
Lecture-1 about programming language.pptx
ISMS Awareness Training (2) (1).pptx
Unit 1 Information Security.docx
Information System Security introduction
For our discussion question, we focus on recent trends in security t.pdf
Information security
Testing
CompTIA Security+ Module1: Security fundamentals
CS5300 class presentation on managing information systems
Chapter1 Information and Network Security
information system and infor,ation management .pptx
Ais Romney 2006 Slides 08 Is Control2
Ad

More from Online Training (20)

PDF
Overcoming Challenges in the Training of Trainers Strategies for Success.pdf
PDF
Career Opportunities for Certified Management Accountants.pdf
PDF
The Role of a CFA in Today’s Financial Industry.pdf
PDF
Effective Cross-Cultural Communication in International HR.pdf
PDF
7 Essential IT Project Management Skills You Need to Succeed.pdf
PDF
Tips and Tricks for Working as an Accountant.pdf
PDF
10 Essential Skills for Project Management Professionals.pdf
PDF
The Top 5 Skills for IT Project Managers
PDF
What is a corporate trainer.pdf
PPTX
ecadema course offered
PDF
Online education
PDF
What is a corporate trainer (3).pdf
PDF
Professional development - why it is important.pdf
PDF
EVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdf
PDF
5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf
PDF
Online Learning Platform.pdf
PDF
Corporate Training & Online Education.pdf
PDF
5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf
PDF
Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...
PDF
Financial Risk Management.pdf
Overcoming Challenges in the Training of Trainers Strategies for Success.pdf
Career Opportunities for Certified Management Accountants.pdf
The Role of a CFA in Today’s Financial Industry.pdf
Effective Cross-Cultural Communication in International HR.pdf
7 Essential IT Project Management Skills You Need to Succeed.pdf
Tips and Tricks for Working as an Accountant.pdf
10 Essential Skills for Project Management Professionals.pdf
The Top 5 Skills for IT Project Managers
What is a corporate trainer.pdf
ecadema course offered
Online education
What is a corporate trainer (3).pdf
Professional development - why it is important.pdf
EVERYTHING YOU NEED TO KNOW ABOUT CIMA QUALIFICATION (1).pdf
5 Key Supply Chain Leaders’ Skills and Why You Need Them.pdf
Online Learning Platform.pdf
Corporate Training & Online Education.pdf
5 Advantages of Workshops on Risk Management by the Professional Trainer.pdf
Online Training For The Healthcare Sector 4 Benefits And 5 Tips For eLearning...
Financial Risk Management.pdf
Ad

Recently uploaded (20)

PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Trump Administration's workforce development strategy
PPTX
Cell Types and Its function , kingdom of life
PPTX
master seminar digital applications in india
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
RMMM.pdf make it easy to upload and study
PDF
Yogi Goddess Pres Conference Studio Updates
2.FourierTransform-ShortQuestionswithAnswers.pdf
Orientation - ARALprogram of Deped to the Parents.pptx
Final Presentation General Medicine 03-08-2024.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Complications of Minimal Access Surgery at WLH
STATICS OF THE RIGID BODIES Hibbelers.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Trump Administration's workforce development strategy
Cell Types and Its function , kingdom of life
master seminar digital applications in india
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
VCE English Exam - Section C Student Revision Booklet
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
RMMM.pdf make it easy to upload and study
Yogi Goddess Pres Conference Studio Updates

What is information security and its types

  • 1. What is Information Security and its types? Information security has been assigned to look after the protection of records and data of organizations from unauthorized access. www.ecadema.com
  • 2. Confidentiality Focusing that the information couldn’t be disclosed to any unauthorized individuals, entities, and processes, breaching confidentiality is taken care of at a top-notch level. www.ecadema.com
  • 3. Integrity Focusing on maintaining the accuracy and entirety of the data. Suppose an employee of a particular department left the organization then all other departments will be informed about the “job left” status so that data is complete and accurate and in addition to this only authorized persons should be allowed to edit employee data. www.ecadema.com
  • 4. Availability Whenever needed, data should be available and accessible to authorized personalities to run the work process in a smooth way. In case, one needs access to an employee’s profile and working credentials, it requires collaboration from different organizational teams like network operations, development operations, incident response, and policy/change management. www.ecadema.com
  • 5. Non-repudiation means that there couldn’t be any denial of sending or receiving the messages or transactions. For instance, in cryptography, messages that match the digital signature signed with the sender’s private key and that sender could have sent a message and nobody else could have altered it in transit is sufficient. www.ecadema.com
  • 6. Authenticity It claims the verification of the users’ profile and the information provided by the employee to be true or not and its source. This principle guarantees the validity of the message source. www.ecadema.com
  • 7. Thank you! Address- 651 N Broad St, Middletown Middletown, DE 19709, United States Mail id - ecadema0@gmail.com Website - www.ecadema.com