Download presentation
Presentation is loading. Please wait.
Published byAbigail Hardy Modified over 9 years ago
1
Threat An action or event that can lead the some loss is known as threat.
2
Types of Threat There are two types of threat. i.Physical threat ii.Logical threat
3
Types of Threat i.Physical threat: Damage cause to the physical infrastructure of information system. Examples: Earth quick, electric short fload
4
Types of Threat ii. Logical threat: Damage threat cause to the logical life of information system. Examples: Virus and intangible object etc
5
Security To be free from damager. OR Prevents unauthorized access, alteration theft, or physical damage.
6
Types of Security There are five types of security. i.Physical Security ii.Personal Security iii.Operational Security iv.Network Security v.Communication Security vi.Information Security
7
Types of Security i. Physical Security: To protect the physical object, item form unauthorized execs. ii. Personal Security: To protect individual or group of individual who are authorize person of an organization.
8
Types of Security iii. Operational Security: To protect the event, operation and set of activity of an organization. iv. Network Security: To protect network and networking component of an organization.
9
Types of Security v. Communication Security: To protect the communication media, technology and contents of an organization. vi. Information Security: To protect information of an organization. Information security is confidentially, integrity and availability of information.
10
vi. Information Security Types of information security: There are three types of information security. i.Confidentially ii.Integrity iii.Availability
11
Types of Information security i. Confidentially: In context to information security confidentially means that information should stay secret only authorize people can access the information. ii. Integrity: Integrity is concerned with trust worthy, origin, completeness and correctness of information.
12
Types of Information Security iii. Availability: To secure the information of an organization. OR assuring that authorized users have continued and timely access to information and resources - e.g., preventing an adversary from flooding a network with bogus traffic that delays legitimate traffic such as that containing new orders from being transmitted
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.