11
+ information security Fundamentals

Information security

Embed Size (px)

DESCRIPTION

Entry level information security presentation for college freshman.

Citation preview

Page 1: Information security

+

information security

Fundamentals

Page 2: Information security

+Secure what?

Physical Assets

Network/Communications

Data/Information

Users

Ultimately, the goal is to protect information. However, to accomplish that goal physical assets must be secured and protected, and users must be educated, trained and responsible.

Page 3: Information security

+Evaluate

What is being protected? hardware, software, confidential and proprietary information

Why? your business image, business information, legal

Value? Can you afford to lose “it”? Can you afford the legal costs?

Page 4: Information security

+Layers of Protection

Physical Location Building Office Home Car Briefcase Data Center

Devices Flash Drive Laptop Workstation Smartphone Tablet

Data Image Files Text Spreadsheet Database

Page 5: Information security

+Hardware Physical Security

Fire protection

Climate control

Physical security

Page 6: Information security

+UPS – Keeping Things Running

Uninterruptible Power Supply Battery Generator

Not just computers Phones and TV A/C (select areas) Lighting (select areas)

Page 7: Information security

+Network Infrastructure

Wireless access

User accounts

Firewalls Physical Software

Network monitoring software

Physical protection

Page 8: Information security

+Data Protection

Backups Global User

Anti- Malware Virus Adware Worms Trojans

Page 9: Information security

+Data Protection

Email Encrypted Digital Signatures Security Threats

Phishing Mails

Storage devices

User authentication Do not share passwords or accounts POS and PMS systems

Timekeeping Money PCI DSS(Payment Card Industry Data Security Standards)

Compliance

Page 10: Information security

+Making it Work

Education/Training/Accountability Polices Procedures Documentation

Management Accountability Checks and balances

Page 11: Information security

+The end

Conclusion

Questions?