Information Technology Information and Systems Security/Compliance Information Security
Information Security
-
Upload
samilmehdiyev -
Category
Documents
-
view
246 -
download
2
description
Transcript of Information Security
![Page 1: Information Security](https://reader036.fdocuments.net/reader036/viewer/2022062510/54b60a064a7959943f8b45ab/html5/thumbnails/1.jpg)
![Page 2: Information Security](https://reader036.fdocuments.net/reader036/viewer/2022062510/54b60a064a7959943f8b45ab/html5/thumbnails/2.jpg)
Index.
1.General concepts of Information Security2.CISO (Chief Information Security Officer)3.Certifications related to Information Security
3.1. CISSP 3.2. CISA, 3.3. Security+
![Page 3: Information Security](https://reader036.fdocuments.net/reader036/viewer/2022062510/54b60a064a7959943f8b45ab/html5/thumbnails/3.jpg)
What is security?
Information security is defined as “protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction”
![Page 4: Information Security](https://reader036.fdocuments.net/reader036/viewer/2022062510/54b60a064a7959943f8b45ab/html5/thumbnails/4.jpg)
When Are We Secure?
Are we secure if our systems are properly patched? Are we secure if we use strong passwords? Are we secure if we are disconnected from the Internet entirely?
![Page 5: Information Security](https://reader036.fdocuments.net/reader036/viewer/2022062510/54b60a064a7959943f8b45ab/html5/thumbnails/5.jpg)
When Are We Secure?
From a certain point of view, all of these questions can be answered with a “NO”
![Page 6: Information Security](https://reader036.fdocuments.net/reader036/viewer/2022062510/54b60a064a7959943f8b45ab/html5/thumbnails/6.jpg)
Confidentiality, Integrity, and Availability Triad
When we discuss security issues, it is often helpful to have a model that we can use as a foundation or a baseline. This model is Confidentiality, Integrity, and Availability (CIA) triad model.
![Page 7: Information Security](https://reader036.fdocuments.net/reader036/viewer/2022062510/54b60a064a7959943f8b45ab/html5/thumbnails/7.jpg)
Confidentiality, Integrity, and Availability Triad
![Page 8: Information Security](https://reader036.fdocuments.net/reader036/viewer/2022062510/54b60a064a7959943f8b45ab/html5/thumbnails/8.jpg)
CISO
Chief Information Security Officer (CISO) is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy and program to ensure information assets are adequately protected.
![Page 9: Information Security](https://reader036.fdocuments.net/reader036/viewer/2022062510/54b60a064a7959943f8b45ab/html5/thumbnails/9.jpg)
Certifications related to Information Security
1) CISSP - The Certified ISS Professional 2) CISM - Certified Information Security Manager3) CSSLP - Certified Secure Software Lifecycle
Professional4) SSCP - Systems Security Certified Practitioner5) ISSAP – ISS Architecture Professional6) ISSEP - ISS Engineering Professional7) ISSMP - ISS Management Professional
![Page 10: Information Security](https://reader036.fdocuments.net/reader036/viewer/2022062510/54b60a064a7959943f8b45ab/html5/thumbnails/10.jpg)
CISSP
•The CISSP is known as the "gold standard" of security certifications.
•It is governed by the International ISS Certification Consortium or (ISC)2.
![Page 11: Information Security](https://reader036.fdocuments.net/reader036/viewer/2022062510/54b60a064a7959943f8b45ab/html5/thumbnails/11.jpg)
(ISC)2
The International Information Systems Security Certification Consortium, also known as(ISC)2, is a global, not-for-profit leader in educating and certifying information security professionals.
![Page 12: Information Security](https://reader036.fdocuments.net/reader036/viewer/2022062510/54b60a064a7959943f8b45ab/html5/thumbnails/12.jpg)
At last
![Page 13: Information Security](https://reader036.fdocuments.net/reader036/viewer/2022062510/54b60a064a7959943f8b45ab/html5/thumbnails/13.jpg)
![Page 14: Information Security](https://reader036.fdocuments.net/reader036/viewer/2022062510/54b60a064a7959943f8b45ab/html5/thumbnails/14.jpg)
Şamil MehdiyevThank you for attention