NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel.

Slides:



Advertisements
Similar presentations
© Caveon, 2006 Under Lock and Key: Conducting a Physical Security Audit John Fremer, Ph.D – President, Caveon Jamie Mulkey, Ed.D. – Sr. Director Caveon.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Chapter 7: Physical & Environmental Security
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Service Design – Section 4.5 Service Continuity Management.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Auditing Computer Systems
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 6
Factors to be taken into account when designing ICT Security Policies
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
PA 230 Unit 5 Midterm Review.
Security Awareness Norfolk State University Policies.
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
Regional Seminar on Census Data Archiving for Africa, Addis Ababa, Ethiopia, September 2011 Overview of Archiving of Microdata Session 4 United Nations.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Evolving IT Framework Standards (Compliance and IT)
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
What does “secure” mean? Protecting Valuables
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Concepts of Database Management Eighth Edition
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Architecture
Responsible Data Use: Data restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
Security and Privacy in Smart Communities By: Dr. Tan Hanh, Dr. Hoang Xuan Dau Posts and Telecommunications Institute of Technology (PTIT), Hanoi, Vietnam.
Georgia Electronic Voting System Testing and Security Voting Systems Testing Summit November 29, 2005.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
CPS ® and CAP ® Examination Review OFFICE ADMINISRATION, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper.
The CLA Licence for the NHSiS 2003   CLA Ltd 2003 JIM MACNEILAGE BUSINESS DEVELOPMENT MANAGER, SCOTLAND.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
ELearning Backpack Initiative Exciting Opportunity for Freshman Raiders.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
Working with HIT Systems
Playing Safely in the Cloud Marie Greenberg, CISSP, IAM, IEM Information Security Manager Virginia State Corporation Commission.
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
MBA 664 Database Management Dave Salisbury ( )
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Management Information Systems The Islamia University of Bahawalpur Delivered by: Tasawar Javed Lecture 16.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
Slide 11-1 Chapter 11 Terms Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
Information Security Crisis Management Daryl Goodwin.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Information Security in Laurier Grant Li Wilfrid Laurier University.
Process Safety Management Soft Skills Programme Nexus Alliance Ltd.
Welcome to the ICT Department Unit 3_5 Security Policies.
Cybersecurity: Risk Management
Information Systems Security
Management Information Systems
Risk management.
Systems Security Keywords Protecting Systems
Chapter 17 Risks, Security and Disaster Recovery
Managing the IT Function
INFORMATION SYSTEMS SECURITY and CONTROL
فلوشیپ اخلاق زیست پزشکی استادیار دانشگاه علوم پزشکی ایران
Security of Data  
Physical Security.
Presentation transcript:

NETWORKS By : Nicolas Pottier

Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel using computers. Example : Biometrics Example : Password

Licences When users are authorised to use technology legally according to the Operators terms and conditions. Example : Concurrent licensing (Purchased by one user but can be given to third parties.) Example : Single user licensing (Purchased by one user and can only be used by that person.)

Physical security Physical barriers and controls that protect resources from any accidental or deliberate threats. Example : Vaults Example : Locks

Monitoring Keeping surveillance on and/or recording the emissions of a user in order to maintain security or for system improvements. Example : Keystroke monitoring Example : system performance

Network policies Sets of conditions, constraints, and settings that indicate to users how they can or cannot manipulate the network. Example : Disaster recovery (Recovering resources from a critical state due to human or natural disasters.) Example : Archiving data

Codes of ethics and professional conduct Guidelines written by an organization to workers, helping them conduct their actions in accordance with its primary values and ethical standards. Example : The Association for Computing Machinery (ACM)

Data centres A facility used to house computer systems and other component systems. Example : Google server

Energy usage The energy consumption when the technology is at a full potential and working efficiently, day in and day out. Example : Uninterruptible power supply (capability of switching to a back up generator in the circumstance that there is a power cut, therefore no power interruption) Back- up generator

THANK YOU!