Presentation is loading. Please wait.

Presentation is loading. Please wait.

Threat An action or event that can lead the some loss is known as threat.

Similar presentations


Presentation on theme: "Threat An action or event that can lead the some loss is known as threat."— Presentation transcript:

1 Threat An action or event that can lead the some loss is known as threat.

2 Types of Threat There are two types of threat. i.Physical threat ii.Logical threat

3 Types of Threat i.Physical threat: Damage cause to the physical infrastructure of information system. Examples: Earth quick, electric short fload

4 Types of Threat ii. Logical threat: Damage threat cause to the logical life of information system. Examples: Virus and intangible object etc

5 Security  To be free from damager. OR  Prevents unauthorized access, alteration theft, or physical damage.

6 Types of Security There are five types of security. i.Physical Security ii.Personal Security iii.Operational Security iv.Network Security v.Communication Security vi.Information Security

7 Types of Security i. Physical Security: To protect the physical object, item form unauthorized execs. ii. Personal Security: To protect individual or group of individual who are authorize person of an organization.

8 Types of Security iii. Operational Security: To protect the event, operation and set of activity of an organization. iv. Network Security: To protect network and networking component of an organization.

9 Types of Security v. Communication Security: To protect the communication media, technology and contents of an organization. vi. Information Security: To protect information of an organization. Information security is confidentially, integrity and availability of information.

10 vi. Information Security Types of information security: There are three types of information security. i.Confidentially ii.Integrity iii.Availability

11 Types of Information security i. Confidentially: In context to information security confidentially means that information should stay secret only authorize people can access the information. ii. Integrity: Integrity is concerned with trust worthy, origin, completeness and correctness of information.

12 Types of Information Security iii. Availability:  To secure the information of an organization. OR  assuring that authorized users have continued and timely access to information and resources - e.g., preventing an adversary from flooding a network with bogus traffic that delays legitimate traffic such as that containing new orders from being transmitted


Download ppt "Threat An action or event that can lead the some loss is known as threat."

Similar presentations


Ads by Google