Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

TOPIC 1

Information Assurance and Security 2- Jumeriz T. Garingan


CIA
- The need for Information Assurance and Security
Information Security
- Methodologies that describe the controls and safeguards an organization takes to ensure its networks and
resources are safe from downtime, interference or malicious intrusion.
- THREATSATTACK

Security Threats
- PHYSICAL
- NON-PHYSICAL
- Internal
- External
- Human

Malwares
- Ransomware
- Denial of Service Attacks
- Phishing

Security breaches:
- Breach of Confidentiality
- Breach of Integrity
- Breach of Availability
- Theft of Service
- Denial of Service

System Security Management


- an efficient method for managing sensitive company information so that it remains secure.

Information Security Trends


- Internet of Things and Cloud Security
- Work-from-home cybersecurity
- International state-sponsored attackers
- Artificial intelligence (AI)
- Building a security-aware culture

Information Security Challenges


- Slow security adaption
- Human Errors
- Third-party vendor security risk

You might also like