1 / 18

Information Security Principles An understanding

Information Security Principles are framed by every organization. These Information Security Principles give out security protocols for securing information.

Download Presentation

Information Security Principles An understanding

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Security Principles: An understanding www.HelpWithAssignment.com

  2. What is Security? • A general definition of security is to being in the state of security – to be free from any kind of danger. • In other words, security is protection against adversaries – from those who would harm, intentionally or otherwise. www.HelpWithAssignment.com

  3. Forms of Security • Today, we can observe the concept of security in almost every place. • The most common forms of security is a uni-layeredor uni-facetedsystem. • But in case of organizations or the nation as such, resort to a multilayeredsystem. www.HelpWithAssignment.com

  4. Types of Security • Some of the most common forms of securities that can be found in many organizations include • Physical security • Personnel security • Operations security • Communications security • Network security • Information security www.HelpWithAssignment.com

  5. Information Security • Information Security according to the Committee on National Security Systems, defines information security as the protection of information and its critical elements, including the systems and hardware that use, store and transmit that information. www.HelpWithAssignment.com

  6. Importance of Information • Here the importance of information must be acknowledged. • Information is one of the most valued assets today. • It is because of the characteristics it possesses. www.HelpWithAssignment.com

  7. Importance of Information Security • Information needs to be protected from unauthorized access. Information leakage can be dangerous for many organizations. • Sometimes, information relating to the internal affairs of an organization may be leaked. www.HelpWithAssignment.com

  8. Need for Information Security • Such information may include the decision to implement a new type of cost cutting system, the financial information of the organization, the list of customers and their financial information, research and development information, information regarding a new product line, etc. www.HelpWithAssignment.com

  9. Loss of Information • Loosing such information can prove to be very costly for an organization. • In case of government, key and strategic information is of utmost importance. www.HelpWithAssignment.com

  10. Loss of Key and Strategic Information • Sometimes, information about national security can be at stake. • Such information can include the list of weapons, testing of new weapons, key and strategic places where weapons are stored, etc. www.HelpWithAssignment.com

  11. Approaches to Information Security • All these kinds of information must be protected. • This calls for information security approaches which can be implemented. This will include www.HelpWithAssignment.com

  12. Bottom-Up Approach • A Bottom-Up approach is the best suited approach for implementing a very good security system. • One of the biggest advantages of this system is that the system or the network administrators who are using this system will implement a security system at the grass-root level. www.HelpWithAssignment.com

  13. Bottom-Up Approach Contd… • This can enhance the information security of the concern. The administrators who possess in-depth knowledge of the system will implement a right security system which would be apt for the organization in terms of their level of operations. In a way, they can help in customizing the security system. www.HelpWithAssignment.com

  14. Bottom-Up Approach Contd… • Some of the characteristics that information possesses include availability, accuracy, authenticity, confidentiality, integrity, utility, possession, etc.  • Information Security Principles are framed by every organization. These Information Security Principles give out security protocols for securing information. www.HelpWithAssignment.com

  15. Top-Down Approach • In Top-Down approach, the higher management of the organization will issue policy, procedures and processes to implement the type of security in the organization. This type of information security will have its own advantages. www.HelpWithAssignment.com

  16. Top-Down Approach Contd… • The top level management will consult experts before implementing any such system. • Experts in the field can forecast future contingencies and will help in preparing for enhanced security procedures which will stop infiltrators from not only entering into the systems in the present, but also in the future. www.HelpWithAssignment.com

  17. Top-Down Approach Contd… • This will also mean that the information security will be constantly monitored and improvements in the same will be undertaken on a regular basis. www.HelpWithAssignment.com

  18. www.HelpWithAssignment.com • For further details on IT Security, visit our websites at • http://www.helpwithassignment.com/IT_Security_Assignment_Help and  • http://www.helpwiththesis.com www.HelpWithAssignment.com

More Related