1 / 9

Cmpe 294 Term Presentation INFORMATION SECURITY

Cmpe 294 Term Presentation INFORMATION SECURITY. Presented By KaushaL Sakhia Guided By Dr. Richard Sinn. Agenda. Scope of Presentation Target Audience Information Attacks, threats and Invaders Information Security Management Career. Information. Information Vs Data

Download Presentation

Cmpe 294 Term Presentation INFORMATION SECURITY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cmpe 294 Term PresentationINFORMATION SECURITY Presented By KaushaL Sakhia Guided By Dr. Richard Sinn

  2. Agenda • Scope of Presentation • Target Audience • Information • Attacks, threats and Invaders • Information Security Management • Career

  3. Information • Information Vs Data • Types of Information • Levels of Information

  4. Attacks, Threats and Invaders • Attacks • Denial-of-Service • Social Engineering • Threats • Corporate Cracks • E-commerce fraud • Invaders • Employee • Hackers • Competitors

  5. Information Security Management System (ISMS) • ISO 27001 certification • Sections (or clauses) • Policies • Data-classification Policy • Intrusion Detection Policy • Virus Prevention Policy • Roles and Responsibilities

  6. ISMS Organizational Structure ISMS Organizational Structure. Information Security Management System, Mizuho Financial Group, Japan at June 26, 2007

  7. Market Solution • EMC Information Security Solutions • Sarcom Information Security solutions Career • Sans Institute – www.sans.com • (ISC)2 – www.isc2.org • Global Information Assurance Certification (GIAC) – www.giac.org

  8. Conclusion There are many possible threats around world for personal and business information . Implementing and maintaining ISMS using ISO standards makes information secured at higher level.

  9. Reference • http://security.practitioner.com/introduction/infosec_4_0.htm • Wani, Pankaj (2001), Information Security Attacks, Exploits and Threats; Nihilent Technologies Pvt. Ltd. http://nihilent.com • Information Security Management System (Jun 26, 2007),Mizuho Financial Group, Japan; http://www.mizuho-fg.co.jp/english/company/internal/compliance_01.html

More Related