Kuchimanchi Lakshmi Prasanna

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Access Control Chapter 3 Part 5 Pages 248 to 252.
Security Controls – What Works
8.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Computer Security: Principles and Practice
PROJECT ON information system audit
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
CSIS Database Security, Dr. Guimaraes Adapted from Afyouni, Database Security and Auditing Database Auditing (Ch. 7) Overview of Auditing Overview.
Module 8: Implementing Administrative Templates and Audit Policy.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Virtual Memory Tuning   You can improve a server’s performance by optimizing the way the paging file is used   You may want to size the paging file.
Inventory Management & Administration System Tourism suite What is the PCI DSS? The PCI DSS stands for Payment Card Industry Data Security Standard.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Transaction Processing System
Security Architecture
Information Systems Security Operational Control for Information Security.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Lesson 1-Logging On to the System. Overview Importance of UNIX/Linux. Logging on to the system.
Information Security What is Information Security?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Chapter 2 Securing Network Server and User Workstations.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Csci5233 Computer Security & Integrity 1 Overview of Security & Java (based on GS: Ch. 1)
1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Understand Audit Policies LESSON Security Fundamentals.
Audit COM380 University of Sunderland Harry R. Erwin, PhD.
Part 1: Corporate Operational benefits, Non-technical information for FSOs and ISSMs/ISSOs Part 2: Technical Tips on how to conduct a better audit review.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Safe’n’Sec IT security solutions for enterprises of any size.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
IS3220 Information Technology Infrastructure Security
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Some Great Open Source Intrusion Detection Systems (IDSs)
«My future profession»
Mirjana Boshnjak Skopje, 20 to 22 September 2017
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Chapter 19: Network Management
INFORMATION SYSTEMS SECURITY AND CONTROL.
Access control techniques
Module Overview Installing and Configuring a Network Policy Server
THE STEPS TO MANAGE THE GRID
Managing the IT Function
Managing Multi-user Databases
Office 365 Security Assessment Workshop
LM 8 Data Administration & Database Administration
Lesson 16-Windows NT Security Issues
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
INFORMATION SYSTEMS SECURITY and CONTROL
Keeping Member Data Safe
A 5-minute overview of ADAudit Plus
HIPAA Security Standards Final Rule
Increase and Improve your PC management with Windows Intune
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
PLANNING A SECURE BASELINE INSTALLATION
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Overview of Computer system
Network Monitoring System
Presentation transcript:

Kuchimanchi Lakshmi Prasanna 0433913 Roadmap to Greener Computing Raoul-Abelin Choumin Nguemaleu Lionel Montheu Kuchimanchi Lakshmi Prasanna 0433913

Security and privacy issues Standard service model has its own potential factors, mainly when regulated to privacy and security issues some of them are listed below System complexity Security measures Shared Multi tenant Environment Threats to computer network and computing infrastructure Internet facing services Remote administrative access Loss of control Loss of control over both physical and logical aspects.

Audit Trails: Usually it refers to the record of changes that have been made to the database or a file system. Audit trails also help in detecting security violations, performance problems. They can be used to support system operations(like: system administration, technical problems ) or insurance policy(used only during failure in executing the primary tasks like : reliability, availability, and recovery).

Motive of Audit Trial: Accomplishment of Security related objectives Individual accountability Reconstruction of Events Intrusion detection Problem analysis

Audit trials and Logs A system has different working environments simultaneously, there will be a register for each and every action performed for the security purposes for this we have 2 kinds of audit records: Key stroke monitoring. Event oriented log(Audit Events).

Keystroke Monitoring Process used to record the keystrokes entered by the computer user and the generated response by the computer during the interactive session. Examples like : Viewing characters when typed by the user Reading electronic mail Viewing the recorded information typed by user

Audit Events Generally used to fine tune and monitor system performance. The critical feature of the Audit trails is flexibility when taken from view of system admin. Different Audit types : System Level Audit trail Application Level Audit User Audit Trails

Implementing issues Protecting Audit trail data Review of Audit Trail Audit trail review after Event Periodic review Real time audit analysis Tools for audit trail analysis Cost considerations

Thanking you 