Mind Map Information Security (Chapter 1)

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 4

INFORMATION SECURITY

Protecting  reduce the


the risk of
functionality unauthorized
of the information
organisation disclosure

Why we need Safeguarding


Information technology
Security assets in
organisations
Enabling the
safe
operation of Protecting
applications the data
that the
organisation
collect and
1 use
CIA (CONFIDENTIAL INTEGRITY AVAILABILITY)
Confidential
Designed to prevent
sensitive information from Banking Online
reaching wrong people using TAC number
while making sure that before access into
authorized people can user bank account
access it.

Integrity
designed to protect data EXAMPLE OF
from deletion or
modification from an
CHARACTERISTIC IMPLEMENTATIO Lock system on
OF CIA Safe box
unauthorized party and N CIA IN REAL
only authorized person ENVIRONMENT
can edit and remains in
its original state when at
rest. Availability
Authentication mechanisms,
access channels and system all Fingerprint
have to work properly for the Biometric system
information they protect and on smartphone
ensure it’s available when it is
2 needed.
Type Of Security Model Simple password

Example: hardware
OPEN SECURITY (router, switch)

Suitable for LANs/public WANs


that are not connected to the
Internet
Most difficult to SECURITY MODEL
implement Protected assests are minimal,
user are trusted, and threats are
minimal
Protected assets are
premium Firewalls and identity servers
CLOSED SECURITY become the foundation of this
model
All users are not RESTRICTIVE
trustworthy, and that SECURITY Suitable for
threats are frequent
LANs/public WANs
All available security Protected assets are
measures substantial, some users are Ease of use for users diminishes
3 not trustworthy as security tighthens
Loss of sensitive
Physical damage
information

AI-powered chatbots
Technical Problem
manipulate information

Loss or corruption Loss of essential


of system data services

POTENTIAL RISK IN
INFORMATION SECURITY
4

You might also like