1 / 23

Understanding Information Security and Its Importance in Protecting Data

Information security is vital for safeguarding information and systems from unauthorized access, use, and threats. Often confused with computer security and information assurance, these terms share goals but have distinct differences. Effective information security protects the confidentiality, integrity, and availability of data. This article explores the significance of information security practices, common misconceptions, and the evolution of security measures in the digital age. Learn how to enhance your organization’s security posture and protect sensitive information.

Télécharger la présentation

Understanding Information Security and Its Importance in Protecting Data

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PR4C71C4| |-|4C|<||\|6 kesavan.m@cognizant.com 1233669600[standard epoch of 1/1/1970 for Tue,03 Feb 2009 14:00:00 IST]

  2. 53<uRE D4T4 • Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.[1]. ... • The terms information security, computer security and information assurance are frequently incorrectly used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them..en.wikipedia.org/wiki//Information_security

  3. "The only truly secure computer is one buried in concrete, with the power turned off and the network cable cut." * Let break that concrete

  4. trinty

  5. vista add user badger-passwd

  6. /etc/passwd badger-passwd

  7. /etc/passwd

  8. badger ?

  9. php shell 

  10. GRANT * TO * BY

  11. GRANT * TO * BY

  12. phpMyAdmin

  13. phpMyAdmin II

  14. phpMyAdmin III

  15. oracle

  16. Mastercard

  17. Visa 

  18. worthy Google ?

  19. task manager ?

  20. somebody watch us try CTRL+SHIFT+ALT+F

  21. key terms • filetype:ini wcx_ftp • inurl:/yabb/Members/Admin.dat • filetype:sql ("passwd values" | "password values" | "pass values" ) • inurl:passlist.txt ext:txt • filetype:log inurl:"password.log" • "login: *" "password: *" filetype:xls • inurl:"editor/list.asp" | inurl:"database_editor.asp" | inurl:"login.asa" "are set" • intitle:"PHP Shell *" "Enable stderr" ext:php • inurl:"editor/list.asp" | inurl:"database_editor.asp" | inurl:"login.asa" "are set" • inurl:ventrilo_srv.ini adminpassword • inurl:main.php Welcome to phpMyAdmin • filetype:sql +"IDENIFIED BY" -cvs • inurl:iisadmpwd • "Mastercard*Number:*Expire:*" ext:html

  22. openSource ? • http://www.stern.org.uk/passlist.txt • http://www.geocities.com/tansaauckland/ • http://altomtransportedi.com/WF/editor/login.asa • http://www.stern.org.uk/phpshell.php • http://s96134469.onlinehome.us/phpMyAdmin/db_details_structure.php?lang=en-iso-8859-1&server=1&db=db97720093 • http://www.heresminnesota.com/blog/phpadmin/db_details_structure.php?lang=en-utf-8&server=1&collation_connection=utf8_general_ci&db=wordpress41

  23. thanx

More Related