MISY3321- Intro. to Information Assurance

Slides:



Advertisements
Similar presentations
Information Technology Awareness Wayne Donald IT Security Officer.
Advertisements

Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
Cyber Security Audit and Network Monitoring P.D. Mynatt Doug Brown March 19 th 2015.
Treasury in the Cloud Bob Stark – Vice President, Strategy September 17, 2014.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Bridget-Anne Hampden U.S. Department of Education Guaranty Agency Security Reviews.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Cyber Security & Fraud – The impact on small businesses.
Desktop Security: Making Sure Your Office Environment is Secure.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Conduct A Strong Evaluation Soar to New Heights! 2013 National Equipment Finance Summit, Albuquerque, NM.
Mohssen Mohammed Sakib Pathan Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body Mohssen Mohammed Sakib Pathan.
Company Overview Introduction For more than 6 years, Geelers has been integrating technology solutions that solve our clients business.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Cloud Security Session: Introduction 25 Sep 2014Cloud Security, Kelsey1 David Kelsey (STFC-RAL) EGI-Geant Symposium Amsterdam 25 Sep 2014.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI D4.4 and the EGI review Dr Linda Cornwall 19 th Sept 2011 D4.41.
White Paper: Enterprise Encryption and Key Management Strategy 1 Vormetric Contact: Name: Tina Stewart (send traffic.
2.4 Cyber-Safety.
Farah AlMangour Rand AlNaim
Performing Risk Analysis and Testing: Outsource or In-house
Rawabi Holding Company Information Assurance
Chapter 1: Exploring the Network
Cisco's Assurance System
Apple (information Assurance Policy)
Network Security Research Presentation
Cybersecurity - What’s Next? June 2017
Management of Technology
CAcert A Communities Way To Professionalism
Miznah A. AlMansour ID# COLLEGE OF BUSINESS ADMINISTRATION
Hybrid Management and Security
ASSET - Automotive Software cyber SEcuriTy
Klynveld Peat Marwick Goerdeler
Recommending a Security Strategy
Lecture 14: Business Information Systems - ICT Security
Working to Keep our Children Safe in a World Filled with Technology
In Search We Trust How does an EU search engine contribute to cybersecurity? EESC, Tuesday, 9 January 2018 Guillaume Vassault-Houlière, on behalf of Eric.
Year 10 ICT ECDL/ICDL IT Security.
Today’s Risk. Today’s Solutions. Cyber security and
Implementing on a Limited Budget: Leveraging Existing Tools within Lockheed Martin Aeronautics Customer Support Centers Successful Collaboration and Knowledge.
IT 200 Competitive Success/snaptutorial.com
Call AVG Antivirus Support | Fix Your PC
Ways to Secure CMS Websites. The most widely used Content Management Systems are Wordpress, Joomla and Drupal as per statistics. The highest CMS platforms.
7 Powerful Ways Software QA Services Expert Helps You Deliver Software Faster.
IT 200 STUDY Education Your Life - it200study.com.
IT 200 STUDY Lessons in Excellence-- it200study.com.
Advance SEO tips & techniques. Search Engine Optimization Search Engine Optimization(SEO) or Organic Search is a process that focuses on increasing the.
IT 200 Education for Service/snaptutorial.com
Making Information Security Manageable with GRC
Security Essentials for Small Businesses
IS4550 Security Policies and Implementation
ROB PROW MIPI/MCMI ALTERNATIVE SOLUTIONS LIMITED
2.4 Cyber-Safety.
How to Use Social Networking to Help Job Seekers
Cyber security Policy development and implementation
Unit# 5: Internet and Worldwide Web
IS4680 Security Auditing for Compliance
By: Dorian Lockhart Wilston Johnston
Power point presentation
Data Breach Working Group
HIPAA Security A Quantitative and Qualitative Risk Assessment
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Securely run and grow your business
Capitalize on Your Business’s Technology
Global One Communications
Information Security in Your Office
National Center for Chronic Disease Prevention and Health Promotion
Cloud Computing for Wireless Networks
Presentation transcript:

MISY3321- Intro. to Information Assurance   Farah AlMangour 201000207 Rand Alnaim 201000006 MISY3321- Intro. to Information Assurance Section: 201 Dr. Muhammad Rafiq

Outline Introduction and a brief history Type of information it keeps Information Assurance Policy Any lost or miss use of Information Conclusion and Recommendations

Introduction Almost everybody in this whole wide world knows what is Google. If you ask a 7-year old kid “What is Google”, a simple answer that you may get is, “A place for you to search about anything”.

Brief history of organization

Type of organization and what type of information it keeps Today when thinking of Google it isn’t just a search engine anymore but also one of the biggest advertising platforms worldwide. It is a software distributor and a mobile phone manufacturer. There are many different ways we can use for Google’s services, such as to search for and to share information, to communicate with other people or to create new content.

Information Assurance Policy Google employs a full-time Information Security Team that is composed of over 250 experts in information, application, and network security. Google security policies and practices provide a series of threat prevention and infrastructure management procedures. The Google Security Team scans for security threats using commercial and in-house-developed tools, automated and manual penetration efforts, quality assurance processes, software security reviews, and external audits

Any lost or miss use of Information Chinese hackers breached Google’s security and stole their entire password system, and that Google could not meet the contracted security requirements of the City of Los Angeles, security remains a huge corporate weakness for Google.

Conclusion There is a growing trust towards Google’s search result rankings. Most of the people who are using Google as their search engine accept the idea that if Google ranks a site on top of search results, that site is reliable and relevant to their search.

Recommendations Conduct a security audit. Make staff aware of the important role they play in security. Use strong and multiple passwords. Encrypt your data. Back up. Have security policies. Protect your mobile work force. Implement a multiple-security-technology solution.

References Google’s Approach to IT Security. (2013, March 3). Retrieved 2012, from Cloud Google: https://cloud.google.com/files/Google-CommonSecurity-WhitePaper-v1.4.pdf Morrow, B. (2008, October 14). History of Google Inc. Retrieved March 1, 2013, from Ben Morrow: http://benmorrow.info/blog/history-of-google-inc Privacy Policy. (2012, July 27). Retrieved March 2, 2013, from Google: http://www.google.com/policies/privacy/ Ray, R. (2012). 8 Tips to Protect Your Business and Secure Its Data. Retrieved March 3, 2013, from Eval Symantec: http://eval.symantec.com/mktginfo/enterprise/other_resources/b-8_tips_protect_your_business_secure_data.en-us.pdf