Importance of IT security ->protects data ->ensures authentication and confidentiality ->preevents data theft.

Slides:



Advertisements
Similar presentations
Database Administration and Security Transparencies 1.
Advertisements

CSA 223 network and web security Chapter one
Security+ Guide to Network Security Fundamentals
1 An Overview of Computer Security computer security.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Computer Security: Principles and Practice
Factors to be taken into account when designing ICT Security Policies
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Client Server Security. Introduction Although client/server architecture is the most popular and widely used computing environment, it the most vulnerable.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Client Server Security DeSiaMorePowered by DeSiaMore1.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
BUSINESS B1 Information Security.
1 Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Security and Privacy Strategic Global Partners, LLC.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Security and Disaster Recover. Security Objectives Balance between effectiveness and difficulty to use Difficult to intrude Detect intrusion Prevent alteration.
Module 11: Designing Security for Network Perimeters.
Chap1: Is there a Security Problem in Computing?.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
FIT03.05 Explain features of network maintenance.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Computer Security By Duncan Hall.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Chapter 7 – Confidentiality Using Symmetric Encryption.
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
1 Figure 1-6: Attacks and Defenses (Study Figure) Access Control  Access control is the body of strategies and practices that a company uses to prevent.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
Database Security Carl J. Hoppe 20 November 2013.
UNIT V Security Management of Information Technology.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Onsite CRM Security
Information Systems Security
INFORMATION SYSTEMS SECURITY AND CONTROL.
Design for Security Pepper.
Secure Software Confidentiality Integrity Data Security Authentication
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Big Picture How many ways can a system be attacked? What can we do about it?
Installation First Server
Security of a Local Area Network
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Enterprise Single Sign-On
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
LINUX SECURITY Dongmei Wu ID: /25/00.
Lesson 16-Windows NT Security Issues
INFORMATION SYSTEMS SECURITY and CONTROL
12 STEPS TO A GDPR AWARE NETWORK
How to Mitigate the Consequences What are the Countermeasures?
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Security week 1 Introductions Class website Syllabus review
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Security in SDR & cognitive radio
Presentation transcript:

Importance of IT security ->protects data ->ensures authentication and confidentiality ->preevents data theft

DATA secrecy ->data can be encrypted using a key and can be protected ->Data can be accessed only by the people with correct username and password

Lecture notes: 1.The first stage is planning which involves how to find the errors or bugs. 2.The second step is to enforce a policy that only authenticated users can access the data with unique username and password. 3.The third step is to monitor and manage the network and see whether any external intruders try to access the network

4.The intrusion detecttion systems detect the intruders who might misuse the data. 5.The fifth step is to assess the security if the intruders are only accesisng the data or modifying it. 6.The sixth step is threat analysisThe threat is analysed in detail and intruders and disconnected from the server. 7.Finally a security policy is created to prevent illegal use of data.

DATA BACKUP ->Keep a backup of data just incase data gets compromised. ->Database backup should also be maintained so that the business doesnt leave the customers behind if there is any attack on the computer system

Implement intrusion detection systemss ->To find intruders who might misuse data ->Disconnect them from the network

To ensure confidentiality ->Never give password to anyone ->The employees should have unique username ->Data should be monitored regularly