Information Security Notes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

UGANDA INSTITUTE OF INFORMATION AND COMMUNICATIONS

TECHNOLOGY

COVER SHEET FOR


“STUDY BUDDIES DISCUSSION GROUP”
YEAR 1/ SEMESTER 1/DAY

DIPLOMA IN INFORMATION TECHNOLOGY FOR BUSSINESS (DITB)

COURSE UNIT: INFORMATION SECURITY MANAGEMENT

BY

LECTURER: MUHANGI ROBERT

“STUDY BUDDIES DISCUSSION GROUP MEMBERS ”


NO. NAMES STUDENT NO. SIGNATURE

01 SSEKITENE DERRICK 2401901333


02 240190
03 240190
04 240190
05 240190
06 240190
07 240190
08 240190
09 240190
10 240190
11 240190
12 240190
13 240190
14 240190
15 240190
16 249190

SUMMARY
CHAPTER ONE: COURSE WORK
CYBER SECURITY
CYBER SECURITY:
Cyber security refers to the ongoing effort to protect the networked systems and all
the data from unauthorized use. Examples of these networked systems include; financial,
medical and education systems.

With cyber security individuals can become;


 Information security experts.
 Ethical hackers.
 Cyber forensics experts.

Always ensure that your data, online and offline identity get full protection so as not to land
in hands of wrong people.
Offline identity refers to the person who your friends and family interact with
physically on a daily basis. On the other side, online identity refers to who you are in cyber
space. Cyber space is an interconnected digital environment like Facebook and instagram.
Your data refers to any information that presents who you are like date of birth and
origin.
Other information that identifies us online includes;
a) Medical records for example mental and physical health.
b) Educational records like disciplinary reports and attendance.
c) Employment and financial records like past employee performance and tax
records.

Individual data like pictures and medical records like charts are stored on computing
devices and servers located in different parts of the world.

Computing devices: These refer to machines which input, process data, store and output
information like laptops, desktops and tablets.
Hackers can use information about you to get long term profit by stealing your
money, identity and gaining access to organization data.

Types of organization data.


1. Traditional data. It refers to structured data that is being majorly maintained by
all types business starting from very small to big organizations which include;
a) Personnel information like application materials and pay roles.
b) Intellectual properties such as trademarks and patents.
c) Financial data such as balance sheet and cash flow statements
2. Internet of things and big data. Refers to a large network of physical objects
such as sensors and equipment that extent beyond the traditional computer network.
Confidentiality, integrity and availability. Also known as (CIA) refer to guidelines for
information security for an organization.
a) Confidentiality; refers to restriction of data in an organization from access by
unauthorized individuals, it ensures privacy of data and it’s achieved by using a
password or username ID.
b) Integrity; refers to accuracy, consistency and trustworthiness of data during the entire
life cycle. It’s achieved by having backups to restore any corrupted data.
c) Availability; backups should be created to ensure that network and data are present to
the authorized users. Reluctance in safeguarding data can result into a security breach
or making system prone to hackers.

Security breach can result into the following;


 Ruined reputation.
 Vandalism.
 Theft.
 Revenue loss.
 Damaged intellectual property.

You might also like