+ All Categories
Home > Education > Security & Privacy of Information Technology

Security & Privacy of Information Technology

Date post: 16-Nov-2014
Category:
Upload: ashish-mathew
View: 435 times
Download: 1 times
Share this document with a friend
Description:
It will give you all a good insight of how the security and privacy is handled.
Popular Tags:
25
SECURITY & PRIVACY FOR DEVICES & TECHNOLOGY..!
Transcript
Page 1: Security & Privacy of Information Technology

SECURITY & PRIVACYFOR

DEVICES & TECHNOLOGY..!

Page 2: Security & Privacy of Information Technology

Group Members :

Sebina Sebastian (P-40)

Ashish Mathew (P-07)

Tushar Pahurkar (P-48)

Samiksha Thanekar (P-37)

Ishan Mahadik (P-11)

Page 3: Security & Privacy of Information Technology

What is Security? Is the protection of assets. The three main

aspects are: • Prevention

• Detection

• Re-action

Page 4: Security & Privacy of Information Technology

Computer Security:

It deals with the prevention and detection of unauthorised actions by users of a computer system.

Page 5: Security & Privacy of Information Technology

It is more than just protecting hardware and software from being crashed

It’s about protecting the information resources that keep the company operating

Goals are to ensure: Data integrity, availability and

confidentiality Business continuity

Information Security

Page 6: Security & Privacy of Information Technology

Risk

Page 7: Security & Privacy of Information Technology

Risks and Threats

Fraudo Computer manipulationo Damage or modification of computer data

Service interruptions and delaysIntrusions

Information manipulation

Page 8: Security & Privacy of Information Technology

Risks and Threats

Denial of service attackso Flood attacko Ping attacko SYN attacko Teardrop attacko Smurf attack

Error

Information theft

Page 9: Security & Privacy of Information Technology

Risks and Threats

• Malicious softwareo Trojan horseo Wormso Boot sector virus

• Web site defacements

Page 10: Security & Privacy of Information Technology

Extortion

Sniffing

Risks and Threats

Page 11: Security & Privacy of Information Technology

Spoofing

Risks and Threats

Page 12: Security & Privacy of Information Technology

Con artists

Phishing or Fishing

Risks and Threats

Page 13: Security & Privacy of Information Technology

COMPUTER CRIMINALSHacker

Script kiddies

Cyber-criminals

Organized crime

Page 14: Security & Privacy of Information Technology

Terrorists

Insiders

COMPUTER CRIMINALS

Page 15: Security & Privacy of Information Technology

COUNTERMEASURES

CIA triad

Page 16: Security & Privacy of Information Technology

Internal Controls Physical

Technical

Administrative

Page 17: Security & Privacy of Information Technology

Firewalls:

Technical Countermeasures

Page 18: Security & Privacy of Information Technology

Encryption/decryption

Page 19: Security & Privacy of Information Technology

• Virtual Private Networks (VPNs)

Page 20: Security & Privacy of Information Technology

• Backup

Page 21: Security & Privacy of Information Technology

Authentication`

Identification

Privacy

IntegrityNon-repudiation

Security’s Five Pillars

Page 22: Security & Privacy of Information Technology

Authentication

Identification

Privacy

Page 23: Security & Privacy of Information Technology

Integrity

Non-repudiation

Page 24: Security & Privacy of Information Technology

Conclusion

Page 25: Security & Privacy of Information Technology

THANK YOU !


Recommended