0% found this document useful (0 votes)
577 views

Mind Map Information Security (Chapter 1)

Information security is designed to [1] protect the functionality of an organization and reduce the risk of unauthorized information disclosure. It aims to [2] safeguard technology assets in organisations by [3] enabling the safe operation of applications and protecting the data that the organisation collects and uses. The key aspects of information security are confidentiality, integrity, and availability (CIA) which are implemented in real environments through measures like access controls, authentication, and system availability. Organizations adopt different security models depending on the sensitivity of their protected assets and the trustworthiness of their users, with closed security being the most restrictive where all available security measures are employed. Potential risks to information security include the loss of sensitive information, physical damage, technical
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
577 views

Mind Map Information Security (Chapter 1)

Information security is designed to [1] protect the functionality of an organization and reduce the risk of unauthorized information disclosure. It aims to [2] safeguard technology assets in organisations by [3] enabling the safe operation of applications and protecting the data that the organisation collects and uses. The key aspects of information security are confidentiality, integrity, and availability (CIA) which are implemented in real environments through measures like access controls, authentication, and system availability. Organizations adopt different security models depending on the sensitivity of their protected assets and the trustworthiness of their users, with closed security being the most restrictive where all available security measures are employed. Potential risks to information security include the loss of sensitive information, physical damage, technical
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 4

INFORMATION SECURITY

Protecting  reduce the


the risk of
functionality unauthorized
of the information
organisation disclosure

Why we need Safeguarding


Information technology
Security assets in
organisations
Enabling the
safe
operation of Protecting
applications the data
that the
organisation
collect and
1 use
CIA (CONFIDENTIAL INTEGRITY AVAILABILITY)
Confidential
Designed to prevent
sensitive information from Banking Online
reaching wrong people using TAC number
while making sure that before access into
authorized people can user bank account
access it.

Integrity
designed to protect data EXAMPLE OF
from deletion or
modification from an
CHARACTERISTIC IMPLEMENTATIO Lock system on
OF CIA Safe box
unauthorized party and N CIA IN REAL
only authorized person ENVIRONMENT
can edit and remains in
its original state when at
rest. Availability
Authentication mechanisms,
access channels and system all Fingerprint
have to work properly for the Biometric system
information they protect and on smartphone
ensure it’s available when it is
2 needed.
Type Of Security Model Simple password

Example: hardware
OPEN SECURITY (router, switch)

Suitable for LANs/public WANs


that are not connected to the
Internet
Most difficult to SECURITY MODEL
implement Protected assests are minimal,
user are trusted, and threats are
minimal
Protected assets are
premium Firewalls and identity servers
CLOSED SECURITY become the foundation of this
model
All users are not RESTRICTIVE
trustworthy, and that SECURITY Suitable for
threats are frequent
LANs/public WANs
All available security Protected assets are
measures substantial, some users are Ease of use for users diminishes
3 not trustworthy as security tighthens
Loss of sensitive
Physical damage
information

AI-powered chatbots
Technical Problem
manipulate information

Loss or corruption Loss of essential


of system data services

POTENTIAL RISK IN
INFORMATION SECURITY
4

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy