TEACHERS
GALLERY
PRICING
SIGN IN
TRY ZURU
GET STARTED
Loop
Audio
Interval:
5s
10s
15s
20s
60s
Play
1 of 28
Slide Notes
Download
Go Live
New! Free Haiku Deck for PowerPoint Add-In
Information security
Share
Copy
Download
0
495
Published on Nov 25, 2015
No Description
View Outline
MORE DECKS TO EXPLORE
PRESENTATION OUTLINE
1.
Information security
Introduction of
Photo by
purpleslog
2.
Table of contents
General concepts
Access control
Security management
Regulatory compliance
Operation security
Network security
Application security
Cryptography
Photo by
epSos.de
3.
General concepts
Photo by
perspec_photo88
4.
Untitled Slide
5.
Untitled Slide
6.
Plan - Establish the goals, objectives and processes.
Do - Implement the plan and execute the process.
Check - Study the actual results and compare against the expected results
Act - Make improvement when necessary, go back to plan
7.
security management
Photo by
Sharon Drummond
8.
Untitled Slide
9.
access control
Photo by
CarbonNYC [in SF!]
10.
Access control is all about managing how subjects interact with objects in authorized manner.
Photo by
Peter aka anemoneprojectors
11.
Subjects are the entities obtain or alter data, for example:
user, computer, program, process
and so on
Photo by
Raido Kaldma
12.
Objects are the entities provide or host data, for example:
files, database, media, printer
and so on
Photo by
T a k
13.
Access control principles
Separation of Duties
Least privilege
Need to know
Compartmentalization
Photo by
Gideon Burton
14.
Separation of Duties is aimed for preventing frauds and errors by distributing tasks and privileges (of a process) to multiple people
Photo by
Roberto Trm
15.
Least privilege is required for a subject to have no more access privilege than necessary for performing tasks, jobs or functions
Photo by
benchilada
16.
Need to know is used to define how much access privilege is needed (to know) based on job functions
Photo by
Iztok Alf Kurnik
17.
Compartmentalization is process of separating groups of people and isolating flow of information between them
Photo by
EJP Photo
18.
Untitled Slide
19.
regulatory compliance
Photo by
jackol
20.
Untitled Slide
21.
operation security
Photo by
The U.S. Army
22.
Untitled Slide
23.
network security
Photo by
CyberHades
24.
Untitled Slide
25.
application security
Photo by
Shinji Nikaru
26.
Untitled Slide
27.
cryptography
Photo by
Ryan Somma
28.
Untitled Slide
Bob Chan
Ă—
Error!