presented by kaushal sakhia guided by dr. richard sinn
TRANSCRIPT
Presented By KaushaL Sakhia Guided ByDr. Richard Sinn
AgendaScope of PresentationTarget AudienceInformationAttacks, threats and InvadersInformation Security ManagementCareer
InformationInformation Vs Data
Types of Information
Levels of Information
Attacks, Threats and InvadersAttacks
Denial-of-Service Social Engineering
ThreatsCorporate CracksE-commerce fraud
InvadersEmployeeHackersCompetitors
Information Security Management System (ISMS)ISO 27001 certification
Sections (or clauses)Policies
Data-classification Policy
Intrusion Detection Policy
Virus Prevention PolicyRoles and
Responsibilities
ISMS Organizational Structure
ISMS Organizational Structure. Information Security Management System, Mizuho Financial Group, Japan at June 26, 2007
Market SolutionEMC Information Security Solutions Sarcom Information Security solutions
CareerSans Institute – www.sans.com(ISC)2 – www.isc2.orgGlobal Information Assurance Certification
(GIAC) – www.giac.org
ConclusionThere are many possible threats around world
for personal and business information . Implementing and maintaining ISMS using ISO standards makes information secured at higher level.
Referencehttp://security.practitioner.com/introduction/
infosec_4_0.htm
Wani, Pankaj (2001), Information Security Attacks, Exploits and Threats; Nihilent Technologies Pvt. Ltd. http://nihilent.com
Information Security Management System (Jun 26, 2007),Mizuho Financial Group, Japan; http://www.mizuho-fg.co.jp/english/company/internal/compliance_01.html