Information Security It Is Your Business

Slides:



Advertisements
Similar presentations
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Advertisements

E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Lecture 11 Reliability and Security in IT infrastructure.
Web server security Dr Jim Briggs WEBP security1.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Factors to be taken into account when designing ICT Security Policies
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Cyber Security Audit and Network Monitoring P.D. Mynatt Doug Brown March 19 th 2015.
Stuart Cunningham - Computer Platforms COMPUTER PLATFORMS Computer & Network Security & User Support & Training Week 11.
Defining Security Issues
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
IS Network and Telecommunications Risks Chapter Six.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Continuous Backup for Business CrashPlan PRO offers a paradigm of backup that includes a single solution for on-site and off-site backups that is more.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
Protecting Your Computer By: Victoria Tuttle. There’s never enough you can do to protect your computer.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
UNIT V Security Management of Information Technology.
Presented by Martin Šimek Ransomware, Internet of Things and Botnets vs. Control.
Security Risks Todays Lesson Security Risks Security Precautions
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Chapter 40 Internet Security.
Performing Risk Analysis and Testing: Outsource or In-house
Working at a Small-to-Medium Business or ISP – Chapter 8
Managing Secure Network Systems
Configuring Windows Firewall with Advanced Security
Lesson Objectives Aims You should be able to:
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Your Computer Wants To Ruin Your Life
Information Security 101 Richard Davis, Rob Laltrello.
Security in Networking
NET 311 Information Security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Computer Security for Businesses
Security.
Gmail Password Support Customer Service Numebr
IT Security awareness Training.
– Communication Technology in a Changing World
Network Security: IP Spoofing and Firewall
ISNE101 Dr. Ken Cosh Week 13.
IS4680 Security Auditing for Compliance
Firewalls Routers, Switches, Hubs VPNs
Managing the Security Function
12 STEPS TO A GDPR AWARE NETWORK
Fire-wall.
Faculty of Science IT Department By Raz Dara MA.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Security.
– Communication Technology in a Changing World
What is Information Security?
Security week 1 Introductions Class website Syllabus review
Cyber security and Computer Misuse
Computer Security By: Muhammed Anwar.
Protecting Data and Information
Chapter # 3 COMPUTER AND INTERNET CRIME
was not invented by Al Gore…
Module 4 System and Application Security
Mohammad Alauthman Computer Security Mohammad Alauthman
INTERNET SECURITY.
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Presentation transcript:

Information Security It Is Your Business Terrell Brown City of Greensboro Water Resources

Topics to Think About General Computer and Network Security Computer and Network Professionals Everyone Else That Works There Hackers, Crackers, Spammers, and Jammers Social Engineering Protection and Backup

Network Security Firewalls, Filters, and Switches Global/Group Policies User Accounts and Passwords Domains Access: Public vs. Private Email Systems Security and Disaster Recovery Preparation Standard Operating Procedures

Computer Security Antivirus: Managed vs. Unmanaged Mailbox Filters Browser Settings: HTTPS and SSL, Block Lists Logins: Administrator Accounts, Automatic Logins Multiple Users

The Pros… Do you have an IT Group? Are they certified and experience? Is there more than one person responsible? Should you source in house or outsource?

And Cons Do you trust your people? Are you paying enough? Too much? Are your systems being audited?

What About Everyone Else? Education is Fundamental Check Up on Your People (Passively) Scare Them Enforce Your Policies

Know Thy Self – Know Thy Enemy

Hackers Reverse Engineers Systems Exploits Security Holes They Don’t Just Walk In Interlopers

Crackers Crack Passwords Break Encryption

Spammers Not really a security threat alone, but… It can promote bad email habits Some spammers are your own people

Jammers Typically Involves a DDoS Attack Distributed Denial of Service Often the easiest method of disrupting service Difficult to trace source and may be from within

Social Engineering Be Suspicious – I don’t recognize this person. Be Cautious – Check credentials. Secure Your Locations – Guards and key cards. Shut Up! – Public information request policies help Don’t Do The Work For Them

Protection and Backup Protect Your Systems and Data Backup Your Data Listen to the professionals and follow industry standards Backup Your Data Onsite and offsite back up will save you Redundant systems How quickly can you recover from a system failure Disaster Recovery Even with backups, if you have nothing to backup to… Then what do you do?

Don’t Wait… Please

Questions and Comments?