Date post: | 16-Nov-2014 |
Category: |
Education |
Upload: | ashish-mathew |
View: | 435 times |
Download: | 1 times |
SECURITY & PRIVACYFOR
DEVICES & TECHNOLOGY..!
Group Members :
Sebina Sebastian (P-40)
Ashish Mathew (P-07)
Tushar Pahurkar (P-48)
Samiksha Thanekar (P-37)
Ishan Mahadik (P-11)
What is Security? Is the protection of assets. The three main
aspects are: • Prevention
• Detection
• Re-action
Computer Security:
It deals with the prevention and detection of unauthorised actions by users of a computer system.
It is more than just protecting hardware and software from being crashed
It’s about protecting the information resources that keep the company operating
Goals are to ensure: Data integrity, availability and
confidentiality Business continuity
Information Security
Risk
Risks and Threats
Fraudo Computer manipulationo Damage or modification of computer data
Service interruptions and delaysIntrusions
Information manipulation
Risks and Threats
Denial of service attackso Flood attacko Ping attacko SYN attacko Teardrop attacko Smurf attack
Error
Information theft
Risks and Threats
• Malicious softwareo Trojan horseo Wormso Boot sector virus
• Web site defacements
Extortion
Sniffing
Risks and Threats
Spoofing
Risks and Threats
Con artists
Phishing or Fishing
Risks and Threats
COMPUTER CRIMINALSHacker
Script kiddies
Cyber-criminals
Organized crime
Terrorists
Insiders
COMPUTER CRIMINALS
COUNTERMEASURES
CIA triad
Internal Controls Physical
Technical
Administrative
Firewalls:
Technical Countermeasures
Encryption/decryption
• Virtual Private Networks (VPNs)
• Backup
Authentication`
Identification
Privacy
IntegrityNon-repudiation
Security’s Five Pillars
Authentication
Identification
Privacy
Integrity
Non-repudiation
Conclusion
THANK YOU !