1 / 7

What is Information Security and its types

Information security has been assigned to look after the protection of records and data of organizations from unauthorized access. It is basically a method to prevent unauthorized access, use, declaration, interference, diminution, inspection, recording, or destruction of information. This information includes your personal details like mobile data, biometrics, or social media information. <br>

Download Presentation

What is Information Security and its types

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What is Information Security and its types? Information security has been assigned to look after the protection of records and data of organizations from unauthorized access. www.ecadema.com

  2. Confidentiality Focusing that the information couldn’t be disclosed to any unauthorized individuals, entities, and processes, breaching confidentiality is taken care of at a top-notch level. www.ecadema.com

  3. Integrity Focusing on maintaining the accuracy and entirety of the data. Suppose an employee of a particular department left the organization then all other departments will be informed about the “job left” status so that data is complete and accurate and in addition to this only authorized persons should be allowed to edit employee data. www.ecadema.com

  4. Availability Whenever needed, data should be available and accessible to authorized personalities to run the work process in a smooth way. In case, one needs access to an employee’s profile and working credentials, it requires collaboration from different organizational teams like network operations, development operations, incident response, and policy/change management. www.ecadema.com

  5. Non-repudiation means that there couldn’t be any denial of sending or receiving the messages or transactions. For instance, in cryptography, messages that match the digital signature signed with the sender’s private key and that sender could have sent a message and nobody else could have altered it in transit is sufficient. www.ecadema.com

  6. Authenticity It claims the verification of the users’ profile and the information provided by the employee to be true or not and its source. This principle guarantees the validity of the message source. www.ecadema.com

  7. Thank you! Address- 651 N Broad St, Middletown Middletown, DE 19709, United States Mail id - ecadema0@gmail.com Website - www.ecadema.com

More Related