Information Assurance and Security Demonstration

ReymonAbenasa 23 views 15 slides Sep 19, 2024
Slide 1
Slide 1 of 15
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15

About This Presentation

Education


Slide Content

INFORMATION ASSURANCE and SECURITY

OBJECTIVES: At the end of the presentation, students will be able to learn; define Information Assurance & Security; learn the principles in information security; learn the different information security threats; Identify & apply the different security tools/ softwares; demonstrate simple security protection using the different tools.

Information Assurance- encompasses the protection of information from an Unauthorized access, use, disclosure, disruption, and modification. Information Assurance Information Security- involves safeguarding data integrity, confidentiality, and availability. It is essential to recognize the threats posed by cyber attacks, data Breaches, and insider threats. Information Security

Information Assurance- encompasses the protection of information from an Unauthorized access, use, disclosure, disruption, and modification. Information Assurance Information Security- involves safeguarding data integrity, confidentiality, and availability. It is essential to recognize the threats posed by cyber attacks, data Breaches, and insider threats. Information Security

Is the protection of the system’s ability to make software systems and data fully available when a user needs it. Consistency includes protection against unauthorized changes (addition, deletion, alterations, etc.) to data. The principle of integrity ensures that data is accurate and reliable and is not modified incorrectly, whether accidentally or maliciously. Measures are designed to prevent unauthorized disclosure of information. The purpose of the confidentiality principle is to keep personal i nformation private and to ensure that it is visible and accessible only to those i ndividuals who own it or need it to perform their organizational functions. 3 Principles of Information Security The basic tenets of information security are confidentiality, integrity, and availability. Together they are called as CIA Triad. CONFIDENTIALITY INTEGRITY AVAILABILITY

Is the protection of the system’s ability to make software systems and data fully available when a user needs it. Consistency includes protection against unauthorized changes (addition, deletion, alterations, etc.) to data. The principle of integrity ensures that data is accurate and reliable and is not modified incorrectly, whether accidentally or maliciously. CONFIDENTIALITY Measures are designed to prevent unauthorized disclosure of information. The purpose of the confidentiality principle is to keep personal i nformation private and to ensure that it is visible and accessible only to those i ndividuals who own it or need it to perform their organizational functions. 3 Principles of Information Security The basic tenets of information security are confidentiality, integrity, and availability. Together they are called as CIA Triad. INTEGRITY AVAILABILITY

Is the protection of the system’s ability to make software systems and data fully available when a user needs it. INTEGRITY Consistency includes protection against unauthorized changes (addition, deletion, alterations, etc.) to data. The principle of integrity ensures that data is accurate and reliable and is not modified incorrectly, whether accidentally or maliciously. Measures are designed to prevent unauthorized disclosure of information. The purpose of the confidentiality principle is to keep personal i nformation private and to ensure that it is visible and accessible only to those i ndividuals who own it or need it to perform their organizational functions. CONFIDENTIALITY 3 Principles of Information Security The basic tenets of information security are confidentiality, integrity, and availability. Together they are called as CIA Triad. AVAILABILITY

AVAILABILITY Is the protection of the system’s ability to make software systems and data fully available when a user needs it. Consistency includes protection against unauthorized changes (addition, deletion, alterations, etc.) to data. The principle of integrity ensures that data is accurate and reliable and is not modified incorrectly, whether accidentally or maliciously. INTEGRITY Measures are designed to prevent unauthorized disclosure of information. The purpose of the confidentiality principle is to keep personal i nformation private and to ensure that it is visible and accessible only to those i ndividuals who own it or need it to perform their organizational functions. CONFIDENTIALITY 3 Principles of Information Security The basic tenets of information security are confidentiality, integrity, and availability. Together they are called as CIA Triad.

Social Media Attacks- Attackers can launch attacks directly via social media , for example by spreading malware via social media messages. Social Engineering- Involve attackers sending emails and messages that trick users into performing actions that may compromise their security. Example is ILOVEYOU virus. Different Malwares and Viruses infecting our computers ; Trojan horse, Rootkits, Ransomware, Adware, Spyware, etc. Lack of Encryption- Encryption processes encode data so that it can only be decoded by users with secret keys. INFORMATION SECURITY THREATS There are hundred of categories of information security threats and millions of Known threat vectors. Below are some of them:

Social Media Attacks- Attackers can launch attacks directly via social media , for example by spreading malware via social media messages. Social Engineering- Involve attackers sending emails and messages that trick users into performing actions that may compromise their security. Example is ILOVEYOU virus. Different Malwares and Viruses infecting our computers ; Trojan horse, Rootkits, Ransomware, Adware, Spyware, etc. Lack of Encryption- Encryption processes encode data so that it can only be decoded by users with secret keys. INFORMATION SECURITY THREATS There are hundred of categories of information security threats and millions of Known threat vectors. Below are some of them:

Helps you monitor, block, and remove viruses as well as other malware from your computer and other IT systems. Ex: Kaspersky, BitDefender, McAfee, Norton, Avast, Etc. Prevent unauthorized users from accessing the company intranet and can Be implemented as hardware, software, or a hybrid of the two. EX: Azure firewall, Proxy Firewall, Packet Filtering, etc Decode or encode streams of data that are at rest or in transit, Making them safe and unreadable by unauthorized individuals. Ex: BitLocker, 7-Zip, NordLocker, etc. Are used to identify external network threats by detecting and preventing attacks that originate from the organization’s intranet. Ex: Wireshark, Firewall, Nessus, SolarWinds, etc. ANTIVIRUS SOFTWARE FIREWALL ENCRYPTION TOOLS NETWORK SECURITY & MONITORING TOOLS COMMON SECURITY TOOLS

Helps you monitor, block, and remove viruses as well as other malware from your computer and other IT systems. Ex: Kaspersky, BitDefender, McAfee, Norton, Avast, Etc. Prevent unauthorized users from accessing the company intranet and can Be implemented as hardware, software, or a hybrid of the two. EX: Azure firewall, Proxy Firewall, Packet Filtering, etc Decode or encode streams of data that are at rest or in transit, Making them safe and unreadable by unauthorized individuals. Ex: BitLocker, 7-Zip, NordLocker, etc. Are used to identify external network threats by detecting and preventing attacks that originate from the organization’s intranet. Ex: Wireshark, Firewall, Nessus, SolarWinds, etc. ANTIVIRUS SOFTWARE FIREWALL ENCRYPTION TOOLS NETWORK SECURITY & MONITORING TOOLS COMMON SECURITY TOOLS

Helps you monitor, block, and remove viruses as well as other malware from your computer and other IT systems. Ex: Kaspersky, BitDefender, McAfee, Norton, Avast, Etc. Prevent unauthorized users from accessing the company intranet and can Be implemented as hardware, software, or a hybrid of the two. EX: Azure firewall, Proxy Firewall, Packet Filtering, etc Decode or encode streams of data that are at rest or in transit, Making them safe and unreadable by unauthorized individuals. Ex: BitLocker, 7-Zip, NordLocker, etc. Are used to identify external network threats by detecting and preventing attacks that originate from the organization’s intranet. Ex: Wireshark, Firewall, Nessus, SolarWinds, etc. ANTIVIRUS SOFTWARE FIREWALL ENCRYPTION TOOLS NETWORK SECURITY & MONITORING TOOLS COMMON SECURITY TOOLS

Helps you monitor, block, and remove viruses as well as other malware from your computer and other IT systems. Ex: Kaspersky, BitDefender, McAfee, Norton, Avast, Etc. Prevent unauthorized users from accessing the company intranet and can Be implemented as hardware, software, or a hybrid of the two. EX: Azure firewall, Proxy Firewall, Packet Filtering, etc Decode or encode streams of data that are at rest or in transit, Making them safe and unreadable by unauthorized individuals. Ex: BitLocker, 7-Zip, NordLocker, etc. Are used to identify external network threats by detecting and preventing attacks that originate from the organization’s intranet. Ex: Wireshark, Firewall, Nessus, SolarWinds, etc. ANTIVIRUS SOFTWARE FIREWALL ENCRYPTION TOOLS NETWORK SECURITY & MONITORING TOOLS COMMON SECURITY TOOLS

EVALUATION:
Tags