Threat An action or event that can lead the some loss is known as threat

Preview:

Citation preview

Threat

An action or event that can lead the some loss is known as threat.

Types of Threat

There are two types of threat.i. Physical threatii. Logical threat

Types of Threat

i. Physical threat:Damage cause to the

physical infrastructure of information system.

Examples:Earth quick, electric short

fload

Types of Threat

ii. Logical threat:Damage threat cause to

the logical life of information system.Examples:

Virus and intangible object etc

Security

To be free from damager. OR

Prevents unauthorized access, alteration theft, or physical damage.

Types of Security

There are five types of security.i. Physical Securityii. Personal Securityiii. Operational Securityiv. Network Securityv. Communication Securityvi. Information Security

Types of Security

i. Physical Security:To protect the physical

object, item form unauthorized execs.ii. Personal Security:

To protect individual or group of individual who are authorize person of an organization.

Types of Security

iii. Operational Security:To protect the event,

operation and set of activity of an organization.

iv. Network Security:To protect network and

networking component of an organization.

Types of Security

v. Communication Security:To protect the

communication media, technology and contents of an organization.

vi. Information Security:To protect information of

an organization. Information security is confidentially, integrity and availability of information.

vi. Information Security

Types of information security:There are three types of information

security.i. Confidentiallyii. Integrityiii. Availability

Types of Information security

i. Confidentially:In context to information security

confidentially means that information should stay secret only authorize people can access the information.

ii. Integrity:Integrity is concerned with trust

worthy, origin, completeness and correctness of information.

Types of Information Security

iii. Availability: To secure the information of an organization.

OR assuring that authorized users have continued

and timely access to information and resources - e.g., preventing an adversary from flooding a network with bogus traffic that delays legitimate traffic such as that containing new orders from being transmitted

Recommended