KEMBAR78
Information Security Fundamentals | PDF | Health Insurance Portability And Accountability Act | Security
0% found this document useful (0 votes)
5 views8 pages

Information Security Fundamentals

The document discusses the relationship between data and information, highlighting that data is raw and unprocessed, while information is analyzed data. It outlines various types of organizational data, including traditional corporate data and the importance of protecting sensitive information through laws such as GDPR, HIPAA, and PCI-DSS. Additionally, it emphasizes the significance of confidentiality, integrity, and availability in cybersecurity practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views8 pages

Information Security Fundamentals

The document discusses the relationship between data and information, highlighting that data is raw and unprocessed, while information is analyzed data. It outlines various types of organizational data, including traditional corporate data and the importance of protecting sensitive information through laws such as GDPR, HIPAA, and PCI-DSS. Additionally, it emphasizes the significance of confidentiality, integrity, and availability in cybersecurity practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

3/2/2025

Information

• Data and information are


interrelated.
• Data usually refers to raw
data, or unprocessed data. It is
the basic form of data that
hasn’t been analyzed or
processed in any manner.
• Once the data is analyzed, it
is considered as information.

Information

MAJU – Nauman H. Ansari 1


3/2/2025

Information (Security for Public Information)

Information (Security for Private Information)

MAJU – Nauman H. Ansari 2


3/2/2025

Where is Your Data?

The image displays a world map with hot points of connections network and servers locations.

Types of Organizational Data


Traditional Data
Corporate data includes personnel information,
intellectual properties, and financial data. The
personnel information includes application
materials, payroll, offer letters, employee
agreements, and any information used in
making employment decisions.
Intellectual property, such as patents,
trademarks and new product plans, allows a
business to gain economic advantage over its
competitors. This intellectual property can be
considered a trade secret; losing this
information can be disastrous for the future of
the company.
The financial data, such as income statements,
balance sheets, and cash flow statements of a
company gives insight into the health of the
company.

MAJU – Nauman H. Ansari 3


3/2/2025

Data Protection Laws and Regulations


• The General Data Protection Regulation (GDPR) is a legal framework that sets
guidelines for the collection and processing of personal information from individuals
who live in the European Union (EU). Since the Regulation applies regardless of where
websites are based, it must be heeded by all sites that attract European visitors, even if
they don't specifically market goods or services to EU residents.
• The Health Insurance Portability and Accountability Act (HIPAA) and the HIPAA Privacy
Rule set the standard for protecting sensitive patient data by creating the standards for
the electronic exchange, and privacy and security of patient medical information by
those in the healthcare industry.
• The Payment Card Industry Data Security Standard (PCI-DSS) is a global security
standard designed to ensure the safe processing, storage, and transmission of credit
and debit card information. It applies to any organization that handles cardholder data,
requiring them to implement strict security measures such as encryption, access
controls, and regular security assessments to protect against fraud and data breaches.

PII and PHI


• Personally identifiable information (PII) is any information that can be
used to positively identify an individual. Examples of PII include:
• Name
• Birthdate
• Credit card numbers
• Bank account numbers
• Government issued ID
• Address information (street, email, phone numbers)
• One of the more lucrative goals of cybercriminals is obtaining lists of PII
that can then be sold on the dark web. The dark web can only be
accessed with special software and is used by cybercriminals to shield
their activities. Stolen PII can be used to create fake accounts, such as
credit cards and short-term loans.
• A subset of PII is protected health information (PHI). The medical
community creates and maintains electronic medical records (EMRs) that
contain PHI. In the U.S., handling of PHI is regulated by the Health
Insurance Portability and Accountability Act (HIPAA). The equivalent
regulation in the European Union is called Data Protection.
• Most hacks on companies and organizations reported in the news
involved stolen PII or PHI.

12

MAJU – Nauman H. Ansari 4


3/2/2025

What can we do?


Three simple steps can help us ensure that the information is not
compromised

Confidentiality – protecting information


from unauthorized disclosure

Integrity – protecting information from


unauthorized modification and ensuring
it is accurate and complete

Availability – ensuring information is


available when needed

16

Activity – Principles of Cybersecurity

18

MAJU – Nauman H. Ansari 5


3/2/2025

20

Confidentiality Integrity Availability


In-class (Group activity)
1

21

MAJU – Nauman H. Ansari 6


3/2/2025

In-class (Group activity)

What are you trying Why are you trying


to protect? to protect it?

Motivations to
How will you protect violate Security?
it?

22

Basic
Component
of an
Information
System

All Components need to be secured

24

MAJU – Nauman H. Ansari 7


3/2/2025

26

MAJU – Nauman H. Ansari 8

You might also like