Information Security and Privacy By: Joshua Waibel.

Slides:



Advertisements
Similar presentations
A Model for When Disclosure Helps Security: What is Different About Computer & Network Security? Peter P. Swire Ohio State University George Mason CII.
Advertisements

Operating System Security
 After the 7 transactions, the ledger looks like Page 105 Figure 4.5. (Show On the White board)  There are 10 accounts in the ledger.  How do you calculate.
Security and Personnel
The costs and benefits related to cyber security breaches Chapter 3 – Gordon & Loeb.
Security+ Guide to Network Security Fundamentals
Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
CMSC 414 Computer (and Network) Security Lecture 10 Jonathan Katz.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
CAREERS IN IT. CAREERS IT The following slides provide an overview of some the common careers in IT. Even though you may not want to work in IT, in many.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
What is a Firewall Anyway?. What is a firewall? A firewall is a network security device positioned between two different networks, usually between an.
Fine-Grained Access Control (FGAC) in the Cloud Robert Barton.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Security Architecture
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
Today’s Lecture Covers < Chapter 6 - IS Security
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Assurance Policy Tim Shimeall
IT Professionalism Ethics Modified by Andrew Poon.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
COMP1321 Networks in Organisations Richard Henson March 2014.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Information Security Training for People who Supervise Computer Users.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Csci5233 computer security & integrity 1 Cryptography: an overview.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
CAREERS IN IT. CAREERS IT The following slides provide an overview of some the common careers in IT. Even though you may not want to work in IT, in many.
MBA 664 Database Management Dave Salisbury ( )
SECURITY ON THE WEB SITE Miguel Angel Vazquez Gonzalez.
Ingredients of Security
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Officer Business Officer Academy 3. Training Objective Task: Understand the nature of cadet officer business for commanders and staff officers Condition:
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
Mixed Economies.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
McLean HIGHER COMPUTER NETWORKING Lesson 12 Network Security Requirements Description of computer and network security requirements (confidentiality,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
BTEC NATIONAL CERTIFICATE IN HEALTH AND SOCIAL CARE Unit 2: Equality, Diversity and Rights in Health and Social Care Settings.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
Information Security and Privacy By: Mike Battestilli.
ISMS Information Security Management System
Solutions of Case Study 4 & 6
CMIT100 Chapter 15 - Information.
The Cost of Free Lesson 4-4.
Domain 2 – Asset Security
Software Processes (a)
1.03 Key Principles for Ethics in Accounting Review
HIPAA Overview.
IS4680 Security Auditing for Compliance
Lesson 1: Introduction to HIPAA
Test Security.
Chapter 4: Security Policies
Session 1 – Introduction to Information Security
Presentation transcript:

Information Security and Privacy By: Joshua Waibel

Overview Definition Why it’s Important Methods of securing information Problems Job market Conclusions

Definition Information Security (Information Assurance) is the process of protecting information availability, data integrity, and privacy

Why it’s Important Today business are more reliant on data stored in computers then ever before In the past many things were written out or printed to create a hard copy Because of this shift it is more important than ever before for the data that is stored to be available, and correct.

Why it’s Important The third aspect of information security, privacy, comes into play mainly when you are dealing with confidential or sensitive data It is also important to remember that these are three general areas of information security that we use to describe it but, Information security is in no way limited to these three areas

Encryption Firewalls Good policy Constant Monitoring Skilled admins & security personnel As well as many others Methods

Problems A computer system can never be completely secure no matter what you do to it. You can only work to raise its level of trust As soon as, or even before, you come up with a new layer of security, attackers come up with a new way to compromise the security of your information The more you concentrate on privacy and data integrity the less availability you will have and vice versa.

Problems

A computer system can never be completely secure no matter what you do to it. You can only work to raise its level of trust As soon as, or even before, you come up with a new layer of security, attackers come up with a new way to compromise the security of your information The more you concentrate on privacy and data integrity the less availability you will have and vice versa.

Problems Most commercial security software available today is based off of military software Overall the military concentrates first on privacy then data integrity and finally availability This is to say, according to the military design, it is better for the data to be destroyed or changed than to be viewed by someone who is not authorized to do so

Problems This model is necessary for the government because the data they store can be extremely sensitive but the same is not true for industry in general An example of why this design is not ideal for all situations is a bank Suppose a bank used the military design for its security. This would imply that the bank would rather an account balanced be altered than to be viewed by someone other than the owner of the account

Problems Obviously this is a ridicules idea In reality each market or even each company needs to have its own security priorities and needs to have software designed accordingly

Job Market The demand for IA ( information assurance) professionals is high and getting higher everyday This demand is primarily the result of two factors mentioned earlier. –First business are relying on computer than ever –Second your computer will never be 100% secure so it require constant up keeping

Conclusions It’s a good field to get into You need to exercise all the methods that you are able to if you want to keep your information secure Information security is the responsibility of all users of a system not just those with that title Each company should decide what areas of information security deserve the highest priorities based their individual needs

Questions?