Security Issues.

Slides:



Advertisements
Similar presentations
Computer Security Computer Security is defined as:
Advertisements

HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Crime and Security in the Networked Economy Part 4.
Guanjong High School Group 2. Physical Network Access Security Getting into a network closet could easily allow someone to disable computers and connect.
Security+ Guide to Network Security Fundamentals
Slide 3.1 Curtis/Cobham © Pearson Education Limited 2008 Chapter 3 Business Information Technology Lecture 1 Computer Hardware.
Security+ Guide to Network Security Fundamentals, Third Edition
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 2 Operating System Security Fundamentals.
Factors to be taken into account when designing ICT Security Policies
Introduction (Pendahuluan)  Information Security.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
CURRENT TRENDS IN DIGITAL ELECTRONICS– AN OVERVIEW
Technology Security Risk Management. Technology Security Risks 1. Data Confidentiality risk 2. System Integrity risk 3. System Availability risk 4. Customer.
Principles of Information Security, 2nd Edition1 Introduction.
Internet safety By Lydia Snowden.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
CMPD273 Multimedia System Prepared by Nazrita Ibrahim © UNITEN2002 Multimedia System Characteristic Reference: F. Fluckiger: “Understanding networked multimedia,
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Information Systems Security
COMPUTER MAIN PART DANILO GARCÍA GONZÁLEZ TÉCNICO EN SISTEMAS.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Lecture 5: User Accounts & Directory Service Instructor: Dr. Najla Al-Nabhan
Operating System Security Fundamentals Dr. Gabriel.
Working with HIT Systems
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Network Security & Accounting
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Chap1: Is there a Security Problem in Computing?.
Operating Systems Concepts 1/e Ruth Watson Chapter 8 Chapter 8 Network Administrator Ruth Watson.
Ingredients of Security
NETWORKING & SYSTEM UPDATES
CPT 123 Internet Skills Class Notes Internet Security Session B.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Module 5: Designing Physical Security for Network Resources
Identity and Access Management
Slide Template for Module 4 Data Storage, Backup, and Security
Securing Network Servers
DATA SECURITY FOR MEDICAL RESEARCH
Add video notes to lecture
The CPU is the brain of the computer
Introduction to Information Security
UNIT 19 Data Security 2.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Information System and Management
Level 2 Diploma Unit 11 IT Security
Final HIPAA Security Rule
County HIPAA Review All Rights Reserved 2002.
Computer Fundamentals
IS4680 Security Auditing for Compliance
IS4680 Security Auditing for Compliance
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
PLANNING A SECURE BASELINE INSTALLATION
Erica Burch Jesse Forrest
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Security Issues

Security in Hardware Security Issues in Hardware: Computer is used as an active tool to conduct the attack on another. Computer itself a identity to attack.It may be Direct (when hacker use personal computer) or Indirect(use network computer) There is a need of security and is also feasible to access the information for its application. Information Security should balance protection and avaialabilty.

Data Storage and Downloadable Devices. Physical components or material where data is stored are called Storage media. Storage Devices Magnetic storage: CD,Hard disk Optical Storage: DVD ROM CDR

Downloadable Device The Device which you can download Audio Video Lectures Online access of application

CCTV(Closed Circuit TV) It is Monitoring Device It has Cameras, Transmitter, Receivers , recording System and a monitor. The camera captures the data and transmits to a receivers which allows the data to be displayed on a monitor . The data are recorded so that it can be reviewed later . Intrution Detection devices are used to sense changes that take place in an environment. IDS are used to detect unauthorized entries and to alert a responsible entity to repond

Access Control Protecting what needs to be protected in a given technology Access control is the heart og Information security

Access Control The basic concepts are Identification, Authentication ,PIN Value , Biometric , one tome password, password, Authorization, and Accountability. It has web server and directory. Access is integrated with web browser, policy manager, policy data bases and services.

Types of Access Controls 1.Administrative control: Define roles, responsibilities, policies, functions to manage the control environment. 2.Technical controls Use Hardware and s/w to implement access control 3. Physical Control Ensure safety and security of the physical environment