presented by kaushal sakhia guided by dr. richard sinn

9
Presented By KaushaL Sakhia Guided By Dr. Richard Sinn

Upload: diana-floyd

Post on 20-Jan-2016

217 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn

Presented By KaushaL Sakhia Guided ByDr. Richard Sinn

Page 2: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn

AgendaScope of PresentationTarget AudienceInformationAttacks, threats and InvadersInformation Security ManagementCareer

Page 3: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn

InformationInformation Vs Data

Types of Information

Levels of Information

Page 4: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn

Attacks, Threats and InvadersAttacks

Denial-of-Service Social Engineering

ThreatsCorporate CracksE-commerce fraud

InvadersEmployeeHackersCompetitors

Page 5: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn

Information Security Management System (ISMS)ISO 27001 certification

Sections (or clauses)Policies

Data-classification Policy

Intrusion Detection Policy

Virus Prevention PolicyRoles and

Responsibilities

Page 6: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn

ISMS Organizational Structure

ISMS Organizational Structure. Information Security Management System, Mizuho Financial Group, Japan at June 26, 2007

Page 7: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn

Market SolutionEMC Information Security Solutions Sarcom Information Security solutions

CareerSans Institute – www.sans.com(ISC)2 – www.isc2.orgGlobal Information Assurance Certification

(GIAC) – www.giac.org

Page 8: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn

ConclusionThere are many possible threats around world

for personal and business information . Implementing and maintaining ISMS using ISO standards makes information secured at higher level.

Page 9: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn

Referencehttp://security.practitioner.com/introduction/

infosec_4_0.htm

Wani, Pankaj (2001), Information Security Attacks, Exploits and Threats; Nihilent Technologies Pvt. Ltd. http://nihilent.com

Information Security Management System (Jun 26, 2007),Mizuho Financial Group, Japan; http://www.mizuho-fg.co.jp/english/company/internal/compliance_01.html