Разделы презентаций


Information security

Plan1. Information security2. The Information Security Concept of Kazakhstan3. Сlassification of threats and attacks

Слайды и текст этой презентации

Слайд 1Information security
Kenzhebaeva Moldir
Kystaubaeva Makpal
Ruzahunova Sabina
Kudaikulova Saltanat

Information security Kenzhebaeva MoldirKystaubaeva MakpalRuzahunova SabinaKudaikulova Saltanat

Слайд 2Plan

1. Information security
2. The Information Security Concept of Kazakhstan
3. Сlassification

of threats and attacks

Plan1. Information security2. The Information Security Concept of Kazakhstan3. Сlassification of threats and attacks

Слайд 3Information Security — state preservation of state information resources and

security
legal rights of the individual and society in the information

sphere.
Information Security — state preservation of state information resources and securitylegal rights of the individual and society

Слайд 4Information security, sometimes shortened to InfoSec, is the practice of

preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or

destruction of information.
The information or data may take any form, e.g. electronic or physical.
Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification,

Слайд 6Types of security
Cryptography structure
Infrastrusture security
Cloud security

Types of securityCryptography structureInfrastrusture securityCloud security

Слайд 7The list of main goals and tasks, the solution of

which information security should ensure:
privacy, confidentiality, secrecy;
data integrity;
identification;
authentication;
authorization;
access control;
ownership;
certification

The list of main goals and tasks, the solution of which information security should ensure:privacy, confidentiality, secrecy;data

Слайд 8By the Decree of the President of the Republic of

Kazakhstan of October
10, 2006 No. 1999 , the Information

Security Concept of the Republic of Kazakhstan was approved. The concept serves as the basis for the formation and implementation of a unified state policy of the Republic of Kazakhstan in the field of information security, its provisions should be considered when creating and developing a unified information space of Kazakhstan and further improving the state of information policy.
By the Decree of the President of the Republic of Kazakhstan of October 10, 2006 No. 1999

Слайд 9Since Kazakhstan gained independence, the protection of state secrets has

been one of the main tasks of the National Security

Committee. Thus, at the initiative of the National Security Committee, in 1992 the State Technical Commission for Information Protection under the Cabinet of Ministers of the Republic of Kazakhstan was established with broad powers to coordinate work in the field of state secret protection.
Since Kazakhstan gained independence, the protection of state secrets has been one of the main tasks of

Слайд 10The main acts of the Republic of Kazakhstan that governs

legal relations in the field of information security are:
1) the

laws of the Republic of Kazakhstan “On State Secrets”, “On Electronic
document and electronic digital signature”,“On informatization”,“On technical
regulation","On licensing","On the media ","On communication"

2) sectoral program in the field of protection of state secrets;

3) sectoral program to ensure the information security;

4) Program for the development of information and communication technologies in
Republic of Kazakhstan for 2010 - 2016, approved by the Government;

5) strategic plans of state bodies.

The main acts of the Republic of Kazakhstan that governs legal relations in the field of information

Слайд 11The main objects of ensuring information security of the Republic

of Kazakhstan in the national information and telecommunication systems are:

The main objects of ensuring information security of the Republic of Kazakhstan in the national information and

Слайд 12Risk: A possibility that a threat exploits a vulnerability in

an asset and causes damage or loss to the asset. Threat:

Something that can potentially cause damage to the organisation, IT Systems or network. Vulnerability: A weakness in the organization, IT Systems, or network that can be exploited by a threat.
Risk: A possibility that a threat exploits a vulnerability in an asset and causes damage or loss

Слайд 13cyberattack
Attacks on websites
other errors
penetration into
sales systems
card
skimmers
inner untargeted
direction
other
criminality
Case

classification from company KazTelCom:
Conclusion

cyberattackAttacks on websitesother errorspenetration into sales systemscard skimmersinner untargeted directionothercriminalityCase classification from company KazTelCom:Conclusion

Слайд 14Thanks for

Thanks for

Обратная связь

Если не удалось найти и скачать доклад-презентацию, Вы можете заказать его на нашем сайте. Мы постараемся найти нужный Вам материал и отправим по электронной почте. Не стесняйтесь обращаться к нам, если у вас возникли вопросы или пожелания:

Email: Нажмите что бы посмотреть 

Что такое TheSlide.ru?

Это сайт презентации, докладов, проектов в PowerPoint. Здесь удобно  хранить и делиться своими презентациями с другими пользователями.


Для правообладателей

Яндекс.Метрика