Computer Security Mike Asoodeh & Ray Dejean Office of Technology Southeastern Louisiana University.

Slides:



Advertisements
Similar presentations
© Ravi Sandhu Introduction to Information Security Ravi Sandhu.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
OSG Computer Security Plans Irwin Gaines and Don Petravick 17-May-2006.
Network Security Introduction Security technologies protect mission-critical networks from corruption and intrusion. Network security enables new business.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security+ Guide to Network Security Fundamentals
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Introducing Computer and Network Security
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Norman SecureSurf Protect your users when surfing the Internet.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
SEC835 Database and Web application security Information Security Architecture.
Computer Crime and Information Technology Security
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
BUSINESS B1 Information Security.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Prepared by: Dinesh Bajracharya Nepal Security and Control.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Monitoring Employees on Networks: Unethical or Good Business?
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Topic 5: Basic Security.
Hurdles in implementation of cyber security in India.
Chap1: Is there a Security Problem in Computing?.
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
Ingredients of Security
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
By Celine and Josh.  A loss caused by customer theft, fraudulent payment, or nonpayment  Shoplifting costs retailers billion dollars a year, according.
Safe’n’Sec IT security solutions for enterprises of any size.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
THE NEED FOR NETWORK SECURITY Hunar & Nawzad & Kovan & Abdulla & Aram.
Why Privacy & Security Awareness Training?. Why is privacy & security awareness training required?
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Building Our IT Security Lines of Defense Working together to protect Government’s IT systems.
Securing Information Systems
Securing Information Systems
Cyber Security Zafar Sadik
ISSeG Integrated Site Security for Grids WP2 - Methodology
AT&T Premises-Based Firewall Enhanced SBS Solution
CHAPTER FOUR OVERVIEW SECTION ETHICS
Information Technology Sector
Security in the Workplace: Information Assurance
Cyber Security By: Pratik Gandhi.
Lecture 14: Business Information Systems - ICT Security
Securing Information Systems
CHAPTER FOUR OVERVIEW SECTION ETHICS
Cybersecurity Threat Assessment
Chapter # 3 COMPUTER AND INTERNET CRIME
Host and Application Security
Presentation transcript:

Computer Security Mike Asoodeh & Ray Dejean Office of Technology Southeastern Louisiana University

Security is a critical area of any information system, and the question is not ‘is the information system vulnerable?’ but ‘how vulnerable is it?’.

Security Realities  Impenetrable security doesn’t exist  Too many facts, not enough information  Human-made environment

Facts  Recent attacks on seemingly "secure" sites such as The White House, DOD, FBI and Microsoft.com have proven that despite massive public and private investment in cyber defense technology and methodology, hackers continue to pose a serious threat to the "information infrastructure."

Facts  These days invasions are experienced directly (perhaps for the first time) by the growing masses of casual web surfers. Personal protection techniques available: –What you know –What you have –What you are

Facts  Computer related attacks double annually Viruses, Hoax and inviting s, Chain letters (spam)  68% acknowledge financial loss  90% not reported  74% used internet connection as POA

Classical Security Model  Isolated islands behind protective barriers  Security management was mainly access control administration of limited numbers of system users (a.k.a. Employees)

Traditional Access Points

eBusiness Model  Open to partners  Open to customers  Open to hackers, thieves, malicious code

New Access Points

A Systemic Approach to Security  Identification of the risks to the environment and business  Development of a security policy that is consistent with business objectives and requirements  Translation of policy into practice through technology and operational Best Practices  Business continuity Plan  Properly trained and trustworthy staff

New Security Considerations Internet / Intranet Attacks  Vandalism/hacktivism  Denial of service  Virus and other malicious code infection  Information theft  Intrusion  Exploitation of assets

New Security Considerations Trust  Identity of partners  Identity of customers  Identity of employees

New Security Considerations Privacy and protection of identity  prevent data interception and data spoofing with a Policy Based Access Control –Who can access data? –Who can invoke service? –Who can impact system? –Are our Assets protected?