SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Security of Data
Issues of privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information systems depend on: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Increasing data integrity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Increasing data security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User Ids and passwords   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Access Rights   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Counteracting Fraud ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protection against viruses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biometric measures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Communications security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Disaster Planning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backup strategies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backup strategies ,[object Object],[object Object],[object Object],[object Object]
Backup hardware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backing-up on-line databases ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Factors in back-up strategy ,[object Object],[object Object],[object Object],[object Object],[object Object]
Recovery procedures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Recovery procedures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere Àhnliche Inhalte

Was ist angesagt?

IT-Audit C&A
IT-Audit C&AIT-Audit C&A
IT-Audit C&A
Mang Sum
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
Tammy Clark
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
Jonathan Coleman
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
phanleson
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
Jan Wong
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
phanleson
 
Overview
OverviewOverview
Overview
phanleson
 

Was ist angesagt? (20)

IT-Audit C&A
IT-Audit C&AIT-Audit C&A
IT-Audit C&A
 
DataPreserve- SEVRAR Jan 09
DataPreserve- SEVRAR Jan 09DataPreserve- SEVRAR Jan 09
DataPreserve- SEVRAR Jan 09
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
 
Database security
Database securityDatabase security
Database security
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
 
Cyber Liability - Small and Medium-Sized Businesses
Cyber Liability - Small and Medium-Sized BusinessesCyber Liability - Small and Medium-Sized Businesses
Cyber Liability - Small and Medium-Sized Businesses
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for Healthcare
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)
 
Overview
OverviewOverview
Overview
 
Security Site Surveys and Risk Assessments
Security Site Surveys and Risk AssessmentsSecurity Site Surveys and Risk Assessments
Security Site Surveys and Risk Assessments
 

Ähnlich wie 3e - Security Of Data

Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
misecho
 
Mis
MisMis
Mis
misecho
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
damonhough
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
MISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
MISY
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdf
bkbk37
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
BabyBoy55
 

Ähnlich wie 3e - Security Of Data (20)

Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Mis
MisMis
Mis
 
Mis
MisMis
Mis
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 
Small Business Owners.pdf
Small Business Owners.pdfSmall Business Owners.pdf
Small Business Owners.pdf
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Data security
Data securityData security
Data security
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdf
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
afdgadfdgadfgadfdgafgadfgadfhdfSDFaashif12 (2).ppt
afdgadfdgadfgadfdgafgadfgadfhdfSDFaashif12 (2).pptafdgadfdgadfgadfdgafgadfgadfhdfSDFaashif12 (2).ppt
afdgadfdgadfgadfdgafgadfgadfhdfSDFaashif12 (2).ppt
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 

Mehr von MISY

Payroll applications new
Payroll applications newPayroll applications new
Payroll applications new
MISY
 
Data management new
Data management newData management new
Data management new
MISY
 
Uses of dbms
Uses of dbmsUses of dbms
Uses of dbms
MISY
 
3. use of ict in time management
3. use of ict in time management3. use of ict in time management
3. use of ict in time management
MISY
 
Ict in time management ca
Ict in time management caIct in time management ca
Ict in time management ca
MISY
 
Ict in publishing ca
Ict in publishing caIct in publishing ca
Ict in publishing ca
MISY
 
Ict in teaching learning ca
Ict in teaching  learning caIct in teaching  learning ca
Ict in teaching learning ca
MISY
 
Ict in advertising ca
Ict in advertising caIct in advertising ca
Ict in advertising ca
MISY
 
Use of ict in advertising
Use of ict in advertisingUse of ict in advertising
Use of ict in advertising
MISY
 
2b working practices
2b working practices2b working practices
2b working practices
MISY
 
Working practices ca
Working practices caWorking practices ca
Working practices ca
MISY
 
Process control ca
Process control caProcess control ca
Process control ca
MISY
 
Intro to control ca
Intro to control caIntro to control ca
Intro to control ca
MISY
 
2a contol systems
2a contol systems2a contol systems
2a contol systems
MISY
 
Robots and cars ca
Robots and cars caRobots and cars ca
Robots and cars ca
MISY
 
3f - Health & Safety
3f - Health & Safety3f - Health & Safety
3f - Health & Safety
MISY
 
3e - Data Protection
3e - Data Protection3e - Data Protection
3e - Data Protection
MISY
 
3d - Working Practices
3d - Working Practices3d - Working Practices
3d - Working Practices
MISY
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
MISY
 
1ab Input Output Devices
1ab   Input Output Devices1ab   Input Output Devices
1ab Input Output Devices
MISY
 

Mehr von MISY (20)

Payroll applications new
Payroll applications newPayroll applications new
Payroll applications new
 
Data management new
Data management newData management new
Data management new
 
Uses of dbms
Uses of dbmsUses of dbms
Uses of dbms
 
3. use of ict in time management
3. use of ict in time management3. use of ict in time management
3. use of ict in time management
 
Ict in time management ca
Ict in time management caIct in time management ca
Ict in time management ca
 
Ict in publishing ca
Ict in publishing caIct in publishing ca
Ict in publishing ca
 
Ict in teaching learning ca
Ict in teaching  learning caIct in teaching  learning ca
Ict in teaching learning ca
 
Ict in advertising ca
Ict in advertising caIct in advertising ca
Ict in advertising ca
 
Use of ict in advertising
Use of ict in advertisingUse of ict in advertising
Use of ict in advertising
 
2b working practices
2b working practices2b working practices
2b working practices
 
Working practices ca
Working practices caWorking practices ca
Working practices ca
 
Process control ca
Process control caProcess control ca
Process control ca
 
Intro to control ca
Intro to control caIntro to control ca
Intro to control ca
 
2a contol systems
2a contol systems2a contol systems
2a contol systems
 
Robots and cars ca
Robots and cars caRobots and cars ca
Robots and cars ca
 
3f - Health & Safety
3f - Health & Safety3f - Health & Safety
3f - Health & Safety
 
3e - Data Protection
3e - Data Protection3e - Data Protection
3e - Data Protection
 
3d - Working Practices
3d - Working Practices3d - Working Practices
3d - Working Practices
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
1ab Input Output Devices
1ab   Input Output Devices1ab   Input Output Devices
1ab Input Output Devices
 

KĂŒrzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

KĂŒrzlich hochgeladen (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

3e - Security Of Data

Hinweis der Redaktion

  1. Human Computer Interface describes how computer interacts with a user. Do not get fixed on idea of PC as only form of computer.
  2. Computer-based information systems are vulnerable to crime and abuse, natural disaster and human error. Integrity of data must be assured and security of data must be protected.