Suche senden
Hochladen
CSE_Instructor_Materials_Chapter2.pptx
•
Als PPTX, PDF herunterladen
•
0 gefällt mir
•
13 views
M
Mohammad512578
Folgen
this slides talk about cyber security fundamintals
Weniger lesen
Mehr lesen
Bildung
Melden
Teilen
Melden
Teilen
1 von 8
Jetzt herunterladen
Empfohlen
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
Bharath Rao
Information security
Information security
Sanjay Tiwari
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
Jenna Murray
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
Mukesh Chinta
The Federal Information Security Management Act
The Federal Information Security Management Act
Michelle Singh
Introduction to security
Introduction to security
Mukesh Chinta
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
Arti Parab Academics
Information security[277]
Information security[277]
Timothy Warren
Empfohlen
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
Bharath Rao
Information security
Information security
Sanjay Tiwari
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
Jenna Murray
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
Mukesh Chinta
The Federal Information Security Management Act
The Federal Information Security Management Act
Michelle Singh
Introduction to security
Introduction to security
Mukesh Chinta
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
Arti Parab Academics
Information security[277]
Information security[277]
Timothy Warren
Data security
Data security
AbdulBasit938
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
Mukesh Chinta
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
Dr Amit Phadikar
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
Mukesh Chinta
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
Precise Testing Solution
security IDS
security IDS
Gregory Hanis
IAS101_Week 2-3_Introduction to Information Systems and Security.pptx
IAS101_Week 2-3_Introduction to Information Systems and Security.pptx
Angela Arago
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...
Editor IJCATR
Cyber Security Intelligence
Cyber Security Intelligence
ijtsrd
unit-1-is1.pptx
unit-1-is1.pptx
sorabhsingh17
Security Ch-1.pptx
Security Ch-1.pptx
KeenboonAsaffaa
CLOUD SECURITY_CIA (1).pptx
CLOUD SECURITY_CIA (1).pptx
SourodeepChakraborty3
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptx
Humphrey Humphrey
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
Karen Oliver
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
Network Security-Module_1.pdf
Network Security-Module_1.pdf
Dr. Shivashankar
Cyber security
Cyber security
Prem Raval
Cryptography and Network Security Principles and PracticeEigh
Cryptography and Network Security Principles and PracticeEigh
MargenePurnell14
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Peter Choi
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
Dr. Mazin Mohamed alkathiri
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
TeacherCyreneCayanan
Weitere ähnliche Inhalte
Ähnlich wie CSE_Instructor_Materials_Chapter2.pptx
Data security
Data security
AbdulBasit938
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
Mukesh Chinta
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
Dr Amit Phadikar
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
Mukesh Chinta
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
Precise Testing Solution
security IDS
security IDS
Gregory Hanis
IAS101_Week 2-3_Introduction to Information Systems and Security.pptx
IAS101_Week 2-3_Introduction to Information Systems and Security.pptx
Angela Arago
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...
Editor IJCATR
Cyber Security Intelligence
Cyber Security Intelligence
ijtsrd
unit-1-is1.pptx
unit-1-is1.pptx
sorabhsingh17
Security Ch-1.pptx
Security Ch-1.pptx
KeenboonAsaffaa
CLOUD SECURITY_CIA (1).pptx
CLOUD SECURITY_CIA (1).pptx
SourodeepChakraborty3
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptx
Humphrey Humphrey
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
Karen Oliver
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
Network Security-Module_1.pdf
Network Security-Module_1.pdf
Dr. Shivashankar
Cyber security
Cyber security
Prem Raval
Cryptography and Network Security Principles and PracticeEigh
Cryptography and Network Security Principles and PracticeEigh
MargenePurnell14
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Peter Choi
Ähnlich wie CSE_Instructor_Materials_Chapter2.pptx
(20)
Data security
Data security
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
security IDS
security IDS
IAS101_Week 2-3_Introduction to Information Systems and Security.pptx
IAS101_Week 2-3_Introduction to Information Systems and Security.pptx
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...
Cyber Security Intelligence
Cyber Security Intelligence
unit-1-is1.pptx
unit-1-is1.pptx
Security Ch-1.pptx
Security Ch-1.pptx
CLOUD SECURITY_CIA (1).pptx
CLOUD SECURITY_CIA (1).pptx
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptx
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
Network Security-Module_1.pdf
Network Security-Module_1.pdf
Cyber security
Cyber security
Cryptography and Network Security Principles and PracticeEigh
Cryptography and Network Security Principles and PracticeEigh
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Kürzlich hochgeladen
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
Dr. Mazin Mohamed alkathiri
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
TeacherCyreneCayanan
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
Celine George
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
Association for Project Management
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
Application orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
RamjanShidvankar
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
TechSoup
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
Maestría en Comunicación Digital Interactiva - UNR
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
agholdier
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
VishalSingh1417
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
christianmathematics
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Celine George
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
Admir Softic
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
RAM LAL ANAND COLLEGE, DELHI UNIVERSITY.
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
iammrhaywood
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
Jayanti Pande
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
Kürzlich hochgeladen
(20)
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
Application orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
CSE_Instructor_Materials_Chapter2.pptx
1.
© 2008 Cisco
Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 2.1 The Three Dimensions of the Cybersecurity Cube
2.
Presentation_ID 2 © 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential The Three Dimensions of the Cybersecurity Cube The Three Dimensions (Cont.) Cybersecurity Safeguards The third dimension of the cybersecurity sorcery cube defines the types of powers used to protect the cyber world. The sorcery cube identifies the three types of powers: Technologies - devices, and products available to protect information systems and fend off cyber criminals. Policies and Practices - procedures, and guidelines that enable the citizens of the cyber world to stay safe and follow good practices. People - Aware and knowledgeable about their world and the dangers that threaten their world.
3.
© 2008 Cisco
Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 3 2.2 CIA TRIAD
4.
Presentation_ID 4 © 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential CIA TRIAD Confidentiality The Principle of Confidentiality Confidentiality prevents the disclosure of information to unauthorized people, resources and processes. Another term for confidentiality is privacy. Organizations need to train employees about best practices in safeguarding sensitive information to protect themselves and the organization from attacks. Methods used to ensure confidentiality include data encryption, authentication, and access control. Protecting Data Privacy Organizations collect a large amount of data and much of this data is not sensitive because it is publicly available, like names and telephone numbers. Other data collected, though, is sensitive. Sensitive information is data protected from unauthorized access to safeguard an individual or an organization.
5.
Presentation_ID 5 © 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential CIA TRIAD Confidentiality (Cont.) Controlling Access Access control defines a number of protection schemes that prevent unauthorized access to a computer, network, database, or other data resources. The concepts of AAA involve three security services: Authentication, Authorization and Accounting. Authentication verifies the identity of a user to prevent unauthorized access. Users prove their identity with a username or I.D. Authorization services determine which resources users can access, along with the operations that users can perform. Authorization can also control when a user has access to a specific resource. Accounting keeps track of what users do, including what they access, the amount of time they access resources, and any changes made.
6.
Presentation_ID 6 © 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential CIA TRIAD Confidentiality (Cont.) Confidentiality and privacy seem interchangeable, but from a legal standpoint, they mean different things. Most privacy data is confidential, but not all confidential data is private. Access to confidential information occurs after confirming proper authorization. Financial institutions, hospitals, medical professionals, law firms, and businesses handle confidential information. Confidential information has a non-public status. Maintaining confidentiality is more of an ethical duty. Privacy is the appropriate use of data. When organizations collect information provided by customers or employees, they should only use that data for its intended purpose.
7.
Presentation_ID 7 © 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential CIA TRIAD Integrity Principle of Data Integrity “Data don’t change” Integrity is the accuracy, consistency, and trustworthiness of data during its entire life cycle. Another term for integrity is quality. Methods used to ensure data integrity include hashing, data validation checks, data consistency checks, and access controls. Need for Data Integrity The need for data integrity varies based on how an organization uses data. For example, Facebook does not verify the data that a user posts in a profile. A bank or financial organization assigns a higher importance to data integrity than Facebook does. Transactions and customer accounts must be accurate. Protecting data integrity is a constant challenge for most organizations. Loss of data integrity can render entire data resources unreliable or unusable. Integrity Checks An integrity check is a way to measure the consistency of a collection of data (a file, a picture, or a record). The integrity check performs a process called a hash function to take a snapshot of data at an instant in time.
8.
Presentation_ID 8 © 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential CIA TRIAD Availability Data availability is the principle used to describe the need to maintain availability of information systems and services at all times. Cyberattacks and system failures can prevent access to information systems and services. Methods used to ensure availability include system redundancy, system backups, increased system resiliency, equipment maintenance, up-to-date operating systems and software, and plans in place to recover quickly from unforeseen disasters. High availability systems typically include three design principles: eliminate single points of failure, provide for reliable crossover, and detect failures as they occur. Organizations can ensure availability by implementing the following: 1. Equipment maintenance 2. OS and system updates 3. Test backups 4. Plan for disasters 5. Implement new technologies 6. Monitor unusual activity 7. Test to verify availability
Jetzt herunterladen