PRESENTATION
PRESENTATION
INFORMATION SYSTEM
SECURITY
INFORMATION SYSTEMS SECURITY
6. Backup
1. Access 3. Network 4. Data 5. Incident 7. Remote
2. Password and
Control Security Encryption Response Access
Policy Recovery
Policy Policy Policy Policy Policy
Policy
Information Systems Security has principles as discussed below;
CONFIDENTIALITY
The Confidentiality principle mainly focuses on prevention of unauthorized disclosure of
information. The purpose of this principle is to keep personal information private and to
ensure that it is visible and accessible only to those individuals who own it or need it to
perform their organizational functions. It also focuses on limiting data inspection and
modification.
Just like any other principle, Confidentiality is prone to threats as explained below;
Threats:
Threats:
1. Unauthorized Access: Bypassing authorization
controls to access resources or data.
2. Privilege Escalation: Exploiting vulnerabilities
to gain higher privileges or access.
3. Identity Theft: Stealing user identities to gain
unauthorized access.
4. Insider Threats: Authorized individuals
misusing their privileges or access.
5. Insecure Configuration: Misconfigured
authorization settings or default permissions.
Measures:
6. Credential Stuffing: Using stolen credentials from one system to access
others.
Threats: