1 / 6

What Are The Principles Of Successful Information Security?

You must know what needs to be protected and what not, know to that you can set up an exceptional good security.

Brainware1
Télécharger la présentation

What Are The Principles Of Successful Information Security?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What Are The Principles Of Successful Information Security?

  2. Overview Information Security seems like a complicated task, but actually the thing isn’t that complicated. You must keep layers of security. In case one fails, then the others will be available. There are three elements to secure access: prevention, detection, and response. It is not possible to secure each and everything that is available. The user must understand what needs to be secured and what are they up against.

  3. There are three goals associated with information security: Confidentiality, Integrity, and Availability. You must keep layers of security. When left on their own, people tend to make the worst security decisions. Examples include falling for scams, and taking the easy way. Computer security is dependent on two types of requirements Functional and Assurance. Disclosure of vulnerabilities is good. Let people know about patches and fixes. Not telling users about issues is bad for business. Security Principles

  4. It is not possible to secure each and everything that is available. The user must understand what needs to be secured and what are they up against.

  5. You must explain correctly to the management, the need for a particular security resource and why it is the best. • People are needed to install a particular software or technology in order to keep it all secure. • Security through obscurity means that hiding the details of the security mechanism is sufficient to secure the system. • You must not make the network much complex. A complex network is more difficult to secure. • Security works more efficiently if the risk factor is kept in mind if kept in mind on a priority basis. Key Features Of Information Security

  6. Thank You Brainware University

More Related