Download presentation
Presentation is loading. Please wait.
Published byPierce Short Modified over 8 years ago
1
Information Security and Privacy By: Joshua Waibel
2
Overview Definition Why it’s Important Methods of securing information Problems Job market Conclusions
3
Definition Information Security (Information Assurance) is the process of protecting information availability, data integrity, and privacy
4
Why it’s Important Today business are more reliant on data stored in computers then ever before In the past many things were written out or printed to create a hard copy Because of this shift it is more important than ever before for the data that is stored to be available, and correct.
5
Why it’s Important The third aspect of information security, privacy, comes into play mainly when you are dealing with confidential or sensitive data It is also important to remember that these are three general areas of information security that we use to describe it but, Information security is in no way limited to these three areas
6
Encryption Firewalls Good policy Constant Monitoring Skilled admins & security personnel As well as many others Methods
7
Problems A computer system can never be completely secure no matter what you do to it. You can only work to raise its level of trust As soon as, or even before, you come up with a new layer of security, attackers come up with a new way to compromise the security of your information The more you concentrate on privacy and data integrity the less availability you will have and vice versa.
8
Problems
9
A computer system can never be completely secure no matter what you do to it. You can only work to raise its level of trust As soon as, or even before, you come up with a new layer of security, attackers come up with a new way to compromise the security of your information The more you concentrate on privacy and data integrity the less availability you will have and vice versa.
10
Problems Most commercial security software available today is based off of military software Overall the military concentrates first on privacy then data integrity and finally availability This is to say, according to the military design, it is better for the data to be destroyed or changed than to be viewed by someone who is not authorized to do so
11
Problems This model is necessary for the government because the data they store can be extremely sensitive but the same is not true for industry in general An example of why this design is not ideal for all situations is a bank Suppose a bank used the military design for its security. This would imply that the bank would rather an account balanced be altered than to be viewed by someone other than the owner of the account
12
Problems Obviously this is a ridicules idea In reality each market or even each company needs to have its own security priorities and needs to have software designed accordingly
13
Job Market The demand for IA ( information assurance) professionals is high and getting higher everyday This demand is primarily the result of two factors mentioned earlier. –First business are relying on computer than ever –Second your computer will never be 100% secure so it require constant up keeping
14
Conclusions It’s a good field to get into You need to exercise all the methods that you are able to if you want to keep your information secure Information security is the responsibility of all users of a system not just those with that title Each company should decide what areas of information security deserve the highest priorities based their individual needs
15
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.