Security management(new) (1)
-
Upload
divyesh-chauhan -
Category
Documents
-
view
245 -
download
0
description
Transcript of Security management(new) (1)
![Page 1: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/1.jpg)
Security Measures
Presented By:
Priyank BothraDevin Chakravarti
Jayesh ChandegaraDivyesh Chauhan
Security Management 1
![Page 2: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/2.jpg)
Computer Crime The unauthorized use, access, modification, and destruction of
hardware, software, data, or network resources
The unauthorized release of information
The unauthorized copying of software
Denying an end user access to his or her own hardware, software, data, or network resources
Using or conspiring to use computer or network resources illegally to obtain information or tangible property
![Page 3: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/3.jpg)
Cyber Crime Safeguards
![Page 4: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/4.jpg)
Different Types of Computer Crimes1. Hacking
2. Cyber theft
3. Unauthorized use at work
4. Piracy
5. Virus & Worms
6. Internet Abuses at Workplace
7. Privacy issues
8. Computer Matching
9. Theft of Intellectual Property
10. Phishing fraud
11. Adware and Spyware
Security Management 4
![Page 5: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/5.jpg)
Common Hacking Tactics
1. Denial of Service
2. Scans
3. Sniffer
4. Spoofing
5. Trojan Horse
6. Back Doors
7. War Dialling
8. Logic Bombs
9. Buffer Overflow
10. Password Crackers
11. Social Engineering
12. Dumpster Driving
Security Management 5
![Page 6: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/6.jpg)
Internet Abuses at Workplace
Security Management 6
![Page 7: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/7.jpg)
Security Management
The goal of security management is the accuracy, integrity, and safety of all information system processes and resources.
![Page 8: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/8.jpg)
Security Management 8
Internetworked Security Defenses Encryption
Data is transmitted in scrambled form
It is unscrambled by computer systems for authorized users only
The most widely used method uses a pair of public and private keys unique to each individual
Public key – encrypts the data.
Private key – decrypts the data
![Page 9: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/9.jpg)
Security Management 9
Internetworked Security Defenses Firewalls
A gatekeeper system that protects a company’s intranets and other computer networks from intrusion
Provides a filter and safe transfer point for access to/from the Internet and other networks
![Page 10: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/10.jpg)
Security Management 10
Internet and Intranet Firewalls
![Page 11: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/11.jpg)
Security Management 11
Internetworked Security Defenses Email Monitoring
Use of content monitoring software that scans for troublesome words that might compromise corporate security
Anti-Virus Centralize the updating and distribution of
antivirus software Use a security suite that integrates virus
protection with firewalls, Web security, and content blocking features
![Page 12: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/12.jpg)
Security Management 12
Other Security Measures
Security Codes Multilevel password system Encrypted passwords Smart cards with microprocessors
Backup Files Duplicate files of data or programs
Security Monitors Monitor the use of computers and networks Protects them from unauthorized use, fraud,
and destruction
![Page 13: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/13.jpg)
Security Management 13
Other Security Measures
Biometrics Computer devices measure physical traits
that make each individual unique Fingerprints, retina scan
Computer Failure Controls Prevents computer failures or minimizes
its effects Preventive maintenance Arrange backups with a disaster recovery
organization
![Page 14: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/14.jpg)
Security Management 14
Other Security Measures
In the event of a system failure, fault-tolerant systems have redundant processors, peripherals, and software.
A disaster recovery plan contains formalized procedures to follow in the event of a disaster
![Page 15: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/15.jpg)
Common Biometric Verification schemes: Face geometry Fingerprints Hand geometry Blood vessel pattern in the retina of a person’s eye Voice Signature Keystroke dynamics Facial thermography Iris scan Using password or PIN
Security Management 15
![Page 16: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/16.jpg)
16
Internet Security
![Page 17: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/17.jpg)
Security Management 17
Securing your system
4 easy steps you can take!
1. Firewall Ex. ZoneAlarm
2. Anti Virus Ex. AVGFree
3. Anti Spyware Ex. Ad-Aware
4. Updates
![Page 18: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/18.jpg)
Security Management 18
The future of secure web connections Extended Validation Certificates
Current system
Internet Explorer
Firefox
New system
Internet Explorer 7
Firefox 3
![Page 19: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/19.jpg)
Security Management 19
The future of secure web connectionsExtra information
![Page 20: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/20.jpg)
Security Management 20
Protecting data
Using strong encryption Password protected Encryption Whole disk encryption
![Page 21: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/21.jpg)
Security Management 21
Wireless security
WLAN, WPA, ETC... What are the risks? Turning on encryption Public access
![Page 22: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/22.jpg)
Security Management 22
Captchas
What are captchas? Do captchas work? Relay attack What about using objects? A new twist on captchas A note about accessibility
![Page 23: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/23.jpg)
Security Management 23
Database security
SQL injections and other threats Good user names and passwords Privilege escalation Extra extensions
![Page 24: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/24.jpg)
Security Management 24
Other Security measures
1. Disaster Recovery system
2. Fault tolerant system
3. Security codes
![Page 25: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/25.jpg)
Security Management 25
Disaster Recovery Planning:
What is Disaster Recovery Planning?
- Restoration of Computing and Communication Services
- Disrupted By Events Primarily Focus on Technical Issues Maintenance of Back-up Example: MasterCard In St. Louis
![Page 26: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/26.jpg)
Security Management 26
Types of Disaster Recovery
Hot Site Warm Site Cold Site
![Page 27: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/27.jpg)
Security Management 27
Hot site:
An alternate facility or backup site Equipped with
Computers Telecommunications environmental infrastructure
Replication of Data From Live site to the Hot site
![Page 28: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/28.jpg)
Security Management 28
Warm site:
An alternate facility or backup processing site Equipped with
Preconfigured Hardware Data Links Communication Interfaces Electrical and Environmental Condition
Replication of Data No Live Data Direct to warm site
![Page 29: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/29.jpg)
Security Management 29
Cold site:
An alternate facility Have Environmental infrastructure No Pre-installed Provisioned at Time of Disaster
![Page 30: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/30.jpg)
Security Management 30
Security codes
What is the Security Code? Codes used to secure
Files Data Money (Eg. Credit Cards)
Key to Lock For Safety Future Security Codes
All Biometrics
![Page 31: Security management(new) (1)](https://reader035.fdocuments.in/reader035/viewer/2022081603/557a7b2cd8b42aa30b8b4cdc/html5/thumbnails/31.jpg)
Thank You
Security Management 31