120 likes | 344 Views
Cmpe 294 Term Presentation INFORMATION SECURITY. Presented By KaushaL Sakhia Guided By Dr. Richard Sinn. Agenda. Scope of Presentation Target Audience Information Attacks, threats and Invaders Information Security Management Career. Information. Information Vs Data
E N D
Cmpe 294 Term PresentationINFORMATION SECURITY Presented By KaushaL Sakhia Guided By Dr. Richard Sinn
Agenda • Scope of Presentation • Target Audience • Information • Attacks, threats and Invaders • Information Security Management • Career
Information • Information Vs Data • Types of Information • Levels of Information
Attacks, Threats and Invaders • Attacks • Denial-of-Service • Social Engineering • Threats • Corporate Cracks • E-commerce fraud • Invaders • Employee • Hackers • Competitors
Information Security Management System (ISMS) • ISO 27001 certification • Sections (or clauses) • Policies • Data-classification Policy • Intrusion Detection Policy • Virus Prevention Policy • Roles and Responsibilities
ISMS Organizational Structure ISMS Organizational Structure. Information Security Management System, Mizuho Financial Group, Japan at June 26, 2007
Market Solution • EMC Information Security Solutions • Sarcom Information Security solutions Career • Sans Institute – www.sans.com • (ISC)2 – www.isc2.org • Global Information Assurance Certification (GIAC) – www.giac.org
Conclusion There are many possible threats around world for personal and business information . Implementing and maintaining ISMS using ISO standards makes information secured at higher level.
Reference • http://security.practitioner.com/introduction/infosec_4_0.htm • Wani, Pankaj (2001), Information Security Attacks, Exploits and Threats; Nihilent Technologies Pvt. Ltd. http://nihilent.com • Information Security Management System (Jun 26, 2007),Mizuho Financial Group, Japan; http://www.mizuho-fg.co.jp/english/company/internal/compliance_01.html