Security in the Workplace: Information Assurance

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
CYBER CRIME AND SECURITY TRENDS
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Program Objective Security Basics
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Defining Security Issues
Cyber crime & Security Prepared by : Rughani Zarana.
BUSINESS B1 Information Security.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Software Security Testing Vinay Srinivasan cell:
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
The Beneficent the MERCIFUL In the NAME of. “ASSURING RELIABLE AND SECURE IT SERVICES”
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Security Training USAID Information Security.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
Introduction to Security Dr. John P. Abraham Professor UTPA.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Security Awareness Program. Agenda  What is Information Security?  Why is Information Security important?  Education Data Breach  Appropriate.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Security Awareness Our security depends on you. What IT Security Protects ECU Campus network and everything attached to it Information –personal data.
Technical Implementation: Security Risks
Securing Information Systems
Security Issues in Information Technology
Chapter 40 Internet Security.
Securing Information Systems
CHAPTER FOUR OVERVIEW SECTION ETHICS
Secure Software Confidentiality Integrity Data Security Authentication
Lecture 8. Cyber Security, Ethics and Trust
Controlling Computer-Based Information Systems, Part II
Network security threats
How to build a good reputation online
Cyber Security By: Pratik Gandhi.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
Unit 4 IT Security.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Securing Information Systems
Call AVG Antivirus Support | Fix Your PC
Risk of the Internet At Home
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Chapter 9 E-Commerce Security and Fraud Protection
INFORMATION SYSTEMS SECURITY and CONTROL
Is your computer being used against you while you sleep?
CHAPTER FOUR OVERVIEW SECTION ETHICS
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Mohammad Alauthman Computer Security Mohammad Alauthman
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Security in the Workplace: Information Assurance Team 1: Mohamed Eid, Wendy Eid, Veronica Austin and Laura Gunsell-Shields

What is a network? A network is defined as an interconnection of three or more communicating entities. These entities are usually passive electronic components that perform a specific function (usually limited in scope).

Security Management In Network Management, this is the set of functions that protect the system from unauthorized access by persons, acts or influences and that includes many sub functions.

Security Implementation Procedure Manual Internal/External Access Control Employee Customer Control of Information Security Alerts

Intrusion of Networks Main focus is to avoid intrusion and to protect against individuals from destroying and damaging your computer and files, whether intentionally or accidentally. Intrusion can cost a company millions of dollars.

Security Threats

Dangerous Computer Geeks!? *Old School Hackers *Cyber-Punks *Crackers *Coders

Hacking Techniques Scan the system Gain Initial Access Gain Full Access Drop a backdoor Get out quick without being detected

ATTACK TRENDS 1980’s : Password cracking 1990’s: Session Hijacking 2000’s : War Driving & Cyber Terrorism

SECURITY THREATS Electronic Infections Abuse of user privileges Denial of Service Proprietary Theft System penetration

CSI 2002 SURVEY REVEALED:

Risk Management

Security Concerns Managers are concerned with protecting assets and information and insuring integrity of business transactions. Customers are concerned with protecting privacy and financial transactions.

Improving Network Security Firewalls Anti-virus software Restrictions on user activity

Firewall Emphasis is to block traffic Serves as a security blanket for management Must be part of overall organizational security architecture

Guidelines for Anti-Virus Process Always run the anti-virus software Never open any files or macros attached to an email from an unknown source Delete Spam, chain, or other junk email without opening or forwarding Never download files from unknown sources Backup critical data Update anti-virus software periodically

Password Protection Frontline defense in computer/network security Change passwords on a regular basis

Characters of Weak Passwords Contain less than 8 characters Words found in the dictionary Common usage words, such as names of pets, family members etc.

Password Don’ts Do not reveal passwords over the phone Do not reveal password in an email Do not reveal password to a boss or co-worker Do not share passwords

Remote Access Users Passphrase is used for remote users by using public/private key authentication A key authentication defines the mathematical relationship between the public key (that is known) and the private key (known only to the user) A passphrase is a longer version of a password and is generally more secure

Recent Headlines

Security Watch How can we stop identity theft? - Identity theft is on the rise, with millions of dollars lost due to fraud each year. Ready to toss that old PC? - Identity thieves have a new hoax: stealing confidential information from used hard drives. What’s wrong with anti-virus apps? - It costs too much to keep anti-virus software up-to-date.

More Headlines…. Is IT overspending on security? - November 20, 2002 Open Source: Rebels at the gate - October 14, 2002

Any Questions?