Information Management System Ali Saeed Khan 29 th April, 2016.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

Cryptography and Network Security Sixth Edition by William Stallings.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 9: Privacy, Crime, and Security
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 1: Overview.
Lecture 1: Overview modified from slides of Lawrie Brown.
Chapter 1 – Introduction
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Discovering Computers 2010
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
C OMPUTER S ECURITY C ONCEPTS By: Qubilah D’souza TE computer.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
Securing Information Systems
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Internet Security facilities for secure communication.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Lecture 7: IT Security PAD 6710.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Completing network setup. INTRODUCTION Course Overview Course Objectives.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Security and Ethics Safeguards and Codes of Conduct.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
COMPUTER SECURITY COMP424 1 ST LECTURE OVERVIEW AND TERMINOLOGIES Dr. Sarah Mustafa Eljack
E-Commerce & Bank Security By: Mark Reed COSC 480.
Network Security Overview
Security Issues in Information Technology
Computer and Network Security
Information Security, Theory and Practice.
Issues and Protections
COMPUTER SECURITY CONCEPTS
Secure Software Confidentiality Integrity Data Security Authentication
BINF 711 Amr El Mougy Sherif Ismail.
Computer and Network Security
Prepared By : Binay Tiwari
How to Mitigate the Consequences What are the Countermeasures?
Introduction to Cryptography
Mohammad Alauthman Computer Security Mohammad Alauthman
Definition Of Computer Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Information Management System Ali Saeed Khan 29 th April, 2016

Lecture Layout Introduction ISF (Information Security Forum) Cyber Security Cyber Attacks/Threats Cyber Defenses/Protective Measures Conclusion

Information Security

Information Security Management

Information Security Management System (ISMS)

ISMS Examples …… Some nations publish and use their own ISMS standards, – e.g. the DoD Information Technology Security Certification and Accreditation Process (DITSCAP) of USA – the German IT baseline protection – ISMS of Japan – ISMS of Korea

CYBER SECURITY ISMS

Cyber Security All feasible measures to protect, – Integrity – Availability – Confidentiality Of – Information – Information system resources (hardware, software, firmware, data and telecommunications)

Three key objectives (the CIA triad) Confidentiality – Data confidentiality: Assures that confidential information is not disclosed to unauthorized individuals – Privacy: Assures that individual control or influence what information may be collected and stored Integrity – Data integrity: assures that information and programs are changed only in a specified and authorized manner – System integrity: Assures that a system performs its operations in unimpaired manner Availability: assure that systems works promptly and service is not denied to authorized users

Cyber Security Authenticity: the property of being genuine and being able to be verified and trusted; confident in the validity of a transmission, or a message, or its originator Accountability: generates the requirement for actions of an entity to be traced uniquely to that individual to support non-repudiation, deference, fault isolation, forensics etc

Global Impact of Cyber Security It’s Personal – Cyber Security issues now impact every individual who uses a computer. It’s no longer science fiction – millions of people worldwide are the victims of cyber-crimes. It’s Business – Every business today is dependent on information and vulnerable to one or more type of Cyber attacks (even those w/o online sites). It’s War – In fact it is already becoming the next Cold War. Cyber operations are also becoming increasing integrated into active conflicts.

Global Impact of Cyber Security

Threats to business include the following: – Financial loss – Legal repercussions – Loss of credibility or competitive edge – Blackmail/industrial espionage – Disclosure of confidential, sensitive or embarrassing information – Sabotage – Corporate espionage – Data theft and ransoming

CYBER ATTACKS ISMS

Virus, Worm, Trojan Can you tell the difference ?

Cyber Attacks ? Types: – Application Layer Attack – Brute Force Attack – DDoS Attack – Network Protocol Attack – Known Vulnerability Attack – Zero day Exploitation – Phishing for credentials – Phishing with malware – Rogue Update Attack – Watering Hole Attack

CYBER DEFENSES ISMS

Cyber Defense Information Security Policy Physical Safe Custody of Assets Access Control Systems Identification Authentication Authorization Single Sign on(SSO) Best Password Practices Antivirus

Cyber Defense Security by design Secure operating systems Secure Databases Firewall (computing) Intrusion detection system Intrusion prevention system Honey Pots & Honey Nets

Cyber Defense Encryption Digital Signature Digital Envelope Activity Logging & Audit Trail Unified Threat Management Products Biometric Devices Penetration Testing

Conclusion Lack of knowledge about the Information security (Cyber security) Lack of use of good practices Shortage of resources

Thank you