information security
DESCRIPTION
Entry level information security presentation for college freshman.TRANSCRIPT
![Page 1: Information security](https://reader034.vdocuments.us/reader034/viewer/2022051513/547aaf1bb4af9f867d8b488f/html5/thumbnails/1.jpg)
+
information security
Fundamentals
![Page 2: Information security](https://reader034.vdocuments.us/reader034/viewer/2022051513/547aaf1bb4af9f867d8b488f/html5/thumbnails/2.jpg)
+Secure what?
Physical Assets
Network/Communications
Data/Information
Users
Ultimately, the goal is to protect information. However, to accomplish that goal physical assets must be secured and protected, and users must be educated, trained and responsible.
![Page 3: Information security](https://reader034.vdocuments.us/reader034/viewer/2022051513/547aaf1bb4af9f867d8b488f/html5/thumbnails/3.jpg)
+Evaluate
What is being protected? hardware, software, confidential and proprietary information
Why? your business image, business information, legal
Value? Can you afford to lose “it”? Can you afford the legal costs?
![Page 4: Information security](https://reader034.vdocuments.us/reader034/viewer/2022051513/547aaf1bb4af9f867d8b488f/html5/thumbnails/4.jpg)
+Layers of Protection
Physical Location Building Office Home Car Briefcase Data Center
Devices Flash Drive Laptop Workstation Smartphone Tablet
Data Image Files Text Spreadsheet Database
![Page 5: Information security](https://reader034.vdocuments.us/reader034/viewer/2022051513/547aaf1bb4af9f867d8b488f/html5/thumbnails/5.jpg)
+Hardware Physical Security
Fire protection
Climate control
Physical security
![Page 6: Information security](https://reader034.vdocuments.us/reader034/viewer/2022051513/547aaf1bb4af9f867d8b488f/html5/thumbnails/6.jpg)
+UPS – Keeping Things Running
Uninterruptible Power Supply Battery Generator
Not just computers Phones and TV A/C (select areas) Lighting (select areas)
![Page 7: Information security](https://reader034.vdocuments.us/reader034/viewer/2022051513/547aaf1bb4af9f867d8b488f/html5/thumbnails/7.jpg)
+Network Infrastructure
Wireless access
User accounts
Firewalls Physical Software
Network monitoring software
Physical protection
![Page 8: Information security](https://reader034.vdocuments.us/reader034/viewer/2022051513/547aaf1bb4af9f867d8b488f/html5/thumbnails/8.jpg)
+Data Protection
Backups Global User
Anti- Malware Virus Adware Worms Trojans
![Page 9: Information security](https://reader034.vdocuments.us/reader034/viewer/2022051513/547aaf1bb4af9f867d8b488f/html5/thumbnails/9.jpg)
+Data Protection
Email Encrypted Digital Signatures Security Threats
Phishing Mails
Storage devices
User authentication Do not share passwords or accounts POS and PMS systems
Timekeeping Money PCI DSS(Payment Card Industry Data Security Standards)
Compliance
![Page 10: Information security](https://reader034.vdocuments.us/reader034/viewer/2022051513/547aaf1bb4af9f867d8b488f/html5/thumbnails/10.jpg)
+Making it Work
Education/Training/Accountability Polices Procedures Documentation
Management Accountability Checks and balances
![Page 11: Information security](https://reader034.vdocuments.us/reader034/viewer/2022051513/547aaf1bb4af9f867d8b488f/html5/thumbnails/11.jpg)
+The end
Conclusion
Questions?