presented by kaushal sakhia guided by dr. richard sinn
TRANSCRIPT
![Page 1: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn](https://reader036.vdocuments.net/reader036/viewer/2022082518/56649e9d5503460f94b9f089/html5/thumbnails/1.jpg)
Presented By KaushaL Sakhia Guided ByDr. Richard Sinn
![Page 2: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn](https://reader036.vdocuments.net/reader036/viewer/2022082518/56649e9d5503460f94b9f089/html5/thumbnails/2.jpg)
AgendaScope of PresentationTarget AudienceInformationAttacks, threats and InvadersInformation Security ManagementCareer
![Page 3: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn](https://reader036.vdocuments.net/reader036/viewer/2022082518/56649e9d5503460f94b9f089/html5/thumbnails/3.jpg)
InformationInformation Vs Data
Types of Information
Levels of Information
![Page 4: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn](https://reader036.vdocuments.net/reader036/viewer/2022082518/56649e9d5503460f94b9f089/html5/thumbnails/4.jpg)
Attacks, Threats and InvadersAttacks
Denial-of-Service Social Engineering
ThreatsCorporate CracksE-commerce fraud
InvadersEmployeeHackersCompetitors
![Page 5: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn](https://reader036.vdocuments.net/reader036/viewer/2022082518/56649e9d5503460f94b9f089/html5/thumbnails/5.jpg)
Information Security Management System (ISMS)ISO 27001 certification
Sections (or clauses)Policies
Data-classification Policy
Intrusion Detection Policy
Virus Prevention PolicyRoles and
Responsibilities
![Page 6: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn](https://reader036.vdocuments.net/reader036/viewer/2022082518/56649e9d5503460f94b9f089/html5/thumbnails/6.jpg)
ISMS Organizational Structure
ISMS Organizational Structure. Information Security Management System, Mizuho Financial Group, Japan at June 26, 2007
![Page 7: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn](https://reader036.vdocuments.net/reader036/viewer/2022082518/56649e9d5503460f94b9f089/html5/thumbnails/7.jpg)
Market SolutionEMC Information Security Solutions Sarcom Information Security solutions
CareerSans Institute – www.sans.com(ISC)2 – www.isc2.orgGlobal Information Assurance Certification
(GIAC) – www.giac.org
![Page 8: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn](https://reader036.vdocuments.net/reader036/viewer/2022082518/56649e9d5503460f94b9f089/html5/thumbnails/8.jpg)
ConclusionThere are many possible threats around world
for personal and business information . Implementing and maintaining ISMS using ISO standards makes information secured at higher level.
![Page 9: Presented By KaushaL Sakhia Guided By Dr. Richard Sinn](https://reader036.vdocuments.net/reader036/viewer/2022082518/56649e9d5503460f94b9f089/html5/thumbnails/9.jpg)
Referencehttp://security.practitioner.com/introduction/
infosec_4_0.htm
Wani, Pankaj (2001), Information Security Attacks, Exploits and Threats; Nihilent Technologies Pvt. Ltd. http://nihilent.com
Information Security Management System (Jun 26, 2007),Mizuho Financial Group, Japan; http://www.mizuho-fg.co.jp/english/company/internal/compliance_01.html