1 Figure 1-6: Attacks and Defenses (Study Figure) Access Control  Access control is the body of strategies and practices that a company uses to prevent.

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

Attacks Framework Attacks Physical Access Attacks -- Wiretapping Server Hacking Vandalism Dialog Attacks -- Eavesdropping Impersonation Message Alteration.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Security+ Guide to Network Security Fundamentals
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Blekinge Institute of Technology, Sweden
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Introduction & Framework Chapter 1 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Revised by Huei Lee.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Protecting ICT Systems
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
PART THREE E-commerce in Action Norton University E-commerce in Action.
BUSINESS B1 Information Security.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
C8- Securing Information Systems
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
Framework Chapter 1 Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
7 Information Security.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
 Introduction to Computing  Computer Programming  Terrorisom.
Manga comic industry security information presentation By Dominic Roofe.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
Chapter 2 Securing Network Server and User Workstations.
Module 11: Designing Security for Network Perimeters.
Network Security & Accounting
Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.
Introduction to Systems Security (January 12, 2015) © Abdou Illia – Spring 2015.
Chap1: Is there a Security Problem in Computing?.
Joshua Fuller. - Passwords keep your information private - Never tell your password to ANYONE - Change your password regularly Basic Security.
Computer Security By Duncan Hall.
Physical security By Ola Abd el-latif Abbass Hassan.
Network Security and Cryptography
DoS Attacks Phishing Keylogging Computer Laws/Acts.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
E-Commerce & Bank Security By: Mark Reed COSC 480.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
Importance of IT security ->protects data ->ensures authentication and confidentiality ->preevents data theft.
WIRE TRANSFERS Unauthorized Payment Order
Securing Information Systems
Edexcel GCSE Cyber security threats Computer Science 1CP1
Threats By Dr. Shadi Masadeh.
A Wireless LAN Security Protocol
Recommending a Security Strategy
Chapter 17 Risks, Security and Disaster Recovery
Answer the questions to reveal the blocks and guess the picture.
Tool Server Workstation Router Universal
Lesson 2- Protecting Yourself Online
Figure 1-7: Eavesdropping on a Dialog
Introduction to Systems Security
Firewalls and Security
Lesson 2- Protecting Yourself Online
Computer Security (Summary)
Securing and Protecting Citizens' Data
Presentation transcript:

1 Figure 1-6: Attacks and Defenses (Study Figure) Access Control  Access control is the body of strategies and practices that a company uses to prevent improper access  Prioritize assets  Specify access control technology and procedures for each asset  Test the protection

2 Figure 1-6: Attacks and Defenses (Study Figure) Site Access Attacks and Defenses  Wiretaps (including wireless LANs intrusions  Hacking servers with physical access

3 Figure 1-6: Attacks and Defenses (Study Figure) Social Engineering  Tricking an employee into giving out information or taking an action that reduces security or harms a system  Opening an attachment that may contain a virus  Asking for a password claming to be someone with rights to know it  Asking for a file to be sent to you

4 Figure 1-6: Attacks and Defenses (Study Figure) Social Engineering Defenses  Training  Enforcement through sanctions (punishment)

5 Figure 1-6: Attacks and Defenses (Study Figure) Dialog Attacks and Defenses  Eavesdropping  Encryption for Confidentiality  Imposters and Authentication  Cryptographic Systems