Presentation is loading. Please wait.

Presentation is loading. Please wait.

MISY3321- Intro. to Information Assurance

Similar presentations


Presentation on theme: "MISY3321- Intro. to Information Assurance"— Presentation transcript:

1 MISY3321- Intro. to Information Assurance
Farah AlMangour Rand Alnaim MISY3321- Intro. to Information Assurance Section: 201 Dr. Muhammad Rafiq

2 Outline Introduction and a brief history Type of information it keeps
Information Assurance Policy Any lost or miss use of Information Conclusion and Recommendations

3 Introduction Almost everybody in this whole wide world knows what is Google. If you ask a 7-year old kid “What is Google”, a simple answer that you may get is, “A place for you to search about anything”.

4 Brief history of organization

5

6 Type of organization and what type of information it keeps
Today when thinking of Google it isn’t just a search engine anymore but also one of the biggest advertising platforms worldwide. It is a software distributor and a mobile phone manufacturer. There are many different ways we can use for Google’s services, such as to search for and to share information, to communicate with other people or to create new content.

7 Information Assurance Policy
Google employs a full-time Information Security Team that is composed of over 250 experts in information, application, and network security. Google security policies and practices provide a series of threat prevention and infrastructure management procedures. The Google Security Team scans for security threats using commercial and in-house-developed tools, automated and manual penetration efforts, quality assurance processes, software security reviews, and external audits

8 Any lost or miss use of Information
Chinese hackers breached Google’s security and stole their entire password system, and that Google could not meet the contracted security requirements of the City of Los Angeles, security remains a huge corporate weakness for Google.

9 Conclusion There is a growing trust towards Google’s search result rankings. Most of the people who are using Google as their search engine accept the idea that if Google ranks a site on top of search results, that site is reliable and relevant to their search.

10 Recommendations Conduct a security audit.
Make staff aware of the important role they play in security. Use strong and multiple passwords. Encrypt your data. Back up. Have security policies. Protect your mobile work force. Implement a multiple-security-technology solution.

11 References Google’s Approach to IT Security. (2013, March 3). Retrieved 2012, from Cloud Google: Morrow, B. (2008, October 14). History of Google Inc. Retrieved March 1, 2013, from Ben Morrow: Privacy Policy. (2012, July 27). Retrieved March 2, 2013, from Google: Ray, R. (2012). 8 Tips to Protect Your Business and Secure Its Data. Retrieved March 3, 2013, from Eval Symantec:


Download ppt "MISY3321- Intro. to Information Assurance"

Similar presentations


Ads by Google