Information technology Vs Information security
-
Upload
s-periyakaruppan-cismiso31000c-ehitilf -
Category
Technology
-
view
2.373 -
download
2
description
Transcript of Information technology Vs Information security
![Page 1: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/1.jpg)
INFORMATION SECURITYIN
INFORMATION TECHNOLOGY
S.PERIYAKARUPPAN (PK)
![Page 2: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/2.jpg)
Agendao Introductiono Basicso Aspectso IT Securityo IT Security Threatso Organizationo Strategyo Significanceo IT Security Vs National Securityo Convenience Vs Securityo Current trendo Questions
![Page 3: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/3.jpg)
Introduction
Rapid Info processing•Efficient and cost-effective solution•Digitized information•Automation - Computer
Digital Information•Information privacy•Information reliability•Information availability
Information security •confidentiality•Authenticy,Integrity&Availability
Challenges
What is Information Technology ??
Computer !!!!!!!!!!!! ??????
![Page 4: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/4.jpg)
Basics
Information architecture• Data lifecycle• Data flow• Data storage
Information classification• Private• Public• Confidential
Information assets• People• Process• Technology
![Page 5: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/5.jpg)
Aspects
• Confidentiality• Privacy• Integrity• Authenticity• Availability• Safety Physical Security
![Page 6: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/6.jpg)
Confidentiality - Privacy
![Page 7: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/7.jpg)
Integrity - Authenticity
![Page 8: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/8.jpg)
Availability
![Page 9: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/9.jpg)
Safety
![Page 10: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/10.jpg)
IT Security
![Page 11: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/11.jpg)
IT Security Threats
![Page 12: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/12.jpg)
Organization
![Page 13: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/13.jpg)
Strategy - Defense
![Page 14: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/14.jpg)
Significance --!! ?
![Page 15: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/15.jpg)
Convenience Vs Security
Do we mind tailgate others in office premises!!?Do we listen to the alerts of invalidcertificate in browser for HTTPS connection !!?Do we use virtual keyboards for passing credentials!!?Do we mind to leave official docs in work-station!!?Do we mind use speaker phones in public!!?Do we always verify secure connectionfor banking websites !!?
![Page 16: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/16.jpg)
Current Trend
![Page 17: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/17.jpg)
IT Security Vs National Security
Cyber War fare
![Page 18: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/18.jpg)
Cyber security defense
![Page 19: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/19.jpg)
![Page 20: Information technology Vs Information security](https://reader035.fdocuments.us/reader035/viewer/2022062307/55635e77d8b42a734b8b4d2e/html5/thumbnails/20.jpg)