Privacy 101: Data Security Implementation for SAP

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Protection of Information Assets I. Joko Dewanto 1.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Barracuda Web Application Firewall
Securing the Borderless Network March 21, 2000 Ted Barlow.
CS795/895.NET Passport1. NET PASSPORT &TRUSTBRIDGE SHRIPAD PATIL CS795/895 SECURITY IN DISTRIBUTED SYSTEMS.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Protecting Customer Websites and Web Applications Web Application Security.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Joseph Ferracin Director IT Security Solutions Managing Security.
Dell Connected Security Solutions Simplify & unify.
Security and Privacy in Smart Communities By: Dr. Tan Hanh, Dr. Hoang Xuan Dau Posts and Telecommunications Institute of Technology (PTIT), Hanoi, Vietnam.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Single Sign-On
Privacy, Confidentiality, and Security Unit 8: Professional Values and Medical Ethics Lecture 2 This material was developed by Oregon Health & Science.
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
Privacy, Confidentiality, and Security Component 2/Unit 8c.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Introduction to Information Security
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
THE NEED FOR NETWORK SECURITY Hunar & Nawzad & Kovan & Abdulla & Aram.
IS3220 Information Technology Infrastructure Security
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Securing Interconnect Networks By: Bryan Roberts.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
CS457 Introduction to Information Security Systems
Information and documentation media systems.
Web Application Protection Against Hackers and Vulnerabilities
Network Security (the Internet Security)
AT&T Premises-Based Firewall Enhanced SBS Solution
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Lecture 5. Security Threats
Module 8: Securing Network Traffic by Using IPSec and Certificates
Chapter 5 Electronic Commerce | Security
Virtualization & Security real solutions
Security in Networking
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
CIS 333 RANK Education for Service-- cis333rank.com.
امنیت شبکه علی فانیان
Chapter 5 Electronic Commerce | Security
Pooja programmer,cse department
IS4680 Security Auditing for Compliance
E-Commerce Security and Fraud Issues and Protections
Contact Center Security Strategies
Module 8: Securing Network Traffic by Using IPSec and Certificates
CBS Security Rolf Kuijpers 15 June 2018 Datastrategie
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Erica Burch Jesse Forrest
The Secure Contingency Plan
Unit 8 Network Security.
Challenges Of Network Security
Introduction to Networking Security
Presentation transcript:

Privacy 101: Data Security Implementation for SAP Ryan Victoria ryan.victoria@kaisa.com Makati, Philippines 22 February 2013

Issues on Computer Security 90% of persons interviewed detected computer security breaches in the last twelve months. 80% of the respondents acknowledged financial losses due to computer breaches. 40% of the respondents were able to quantify their financial losses. 55% of the respondents reported denial of service. Source: Computer Security Institute, http://www.gocsi.com

Challenges on Data Security ITIL Confidentiality Protection Cost-benefit relation Efficiency Integrity Availability Protection of sensitive business data Laws Agreements Regulations Cost-benefit relation Efficiency of business processes

Impact of security breach To business Poor data quality/dispersed data Inefficient processes Poor business agility Leak of confidential information Expensive (TCO) To IT Missed SLAs Performance issues Limited time for value-added innovation Audit non-conformances Supportability and heterogeneity

Goal Data Hackers Security Protect Assets From Threats Through Measures Data Hackers Security

Security in every layer Presentation Communication Web connection Application Database Operating system

Securing the Database Encryption Vulnerability patches

Securing the Application System admin Authori-zations Profiles Users SAP system System access control Access control . Five-stage implementation of the authorization concept. . Login parameters

Securing the Web connection Internet SAP system ITS Encryption Certificates Single Sign-on . Wgate and Agate . Loadbalancing . ITS parameters . Enable SNC for network security --- SAP Cryptographic Library – public and private key – SNC Personal Security Environment (PSE) . Security parameters sec/..., ssf/... . In recent years, have become obsolete / less and less – because of improved Internet security features (firewalls, VLAN, DMZ) . SSO – social engineering ... <> CUA --- Through logon tickets ... Sso parameters

Securing the Communication Internet SAP system Access control Packet filtering Encryption . SAProuter, network, SNC . DMZ . Encryption using SSL – HTTPS - SAPCryptoLib

Securing the Presentation Access control Virus scanners Encryption Enterprise portal

Summary Data security is the responsibility of both the business and the IT group. Security in every layer. Kaisa can help you.

Visit http://www.kaisa.com THANK YOU!