SECURITY AND INFORMATION SYSTEMS THE EVOLUTION OF SECURITY SYSTEMS Created By: Jamere Hill Instructor: Kyhia Bostic Section 19653 University of Houston.

Slides:



Advertisements
Similar presentations
© Ravi Sandhu Introduction to Information Security Ravi Sandhu.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
5.9 + = 10 a)3.6 b)4.1 c)5.3 Question 1: Good Answer!! Well Done!! = 10 Question 1:
Information Security Awareness Briefing 5 November 2013.
Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
K-State IT Security Training Ken Stafford CIO and Vice Provost for IT Services Harvard Townsend Chief Information Security Officer
Thank you to IT Training at Indiana University Computer Malware.
Layered Security Solutions - Simplified © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
LittleOrange Internet Security an Endpoint Security Appliance.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
CYBER CRIME AND SECURITY TRENDS
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Hacker Zombie Computer Reflectors Target.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
HDSB Security Awareness Training. Introduction Good security standards follow the 90/10 rule: 10% of security safeguards are technical. 90% of security.
Chapter 16:Managing Information and Technology. Basic element of computer technology  Hardware: input, store, and organize data  System software: performs.
Managing Information System Security: Principles GP Dhillon Associate Professor Virginia Commonwealth University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
My Future Career in Information Systems  How Computer Skills Will Open Up Opportunities  Created by: Cody Larson  Class Section:  Instructor:
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
Computer Skills and Applications Computer Security.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
MIS323 – Business Telecommunications Chapter 10 Security.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Cyber crime and security issues
Botnets A collection of compromised machines
Instructor Materials Chapter 7 Network Security
Botnets A collection of compromised machines
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Risk of the Internet At Home
Faculty of Science IT Department By Raz Dara MA.
Networking for Home and Small Businesses – Chapter 8
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

SECURITY AND INFORMATION SYSTEMS THE EVOLUTION OF SECURITY SYSTEMS Created By: Jamere Hill Instructor: Kyhia Bostic Section University of Houston

TABLE OF CONTENTS Introduction ………. Slide 3 Defining Information Systems Security………. Slide 4 Threats to Information Systems………. Slide 5 A Growing Concern………. Slide 6 ………. Slide 7 Security Collage……… Slide 8 Consequences of Hacked Systems………. Slide 9 Current Solutions & Defenses………. Slide 10 New Approaches to Information Security ………. Slide 11 ………. Slide 12 Slide From Another Presentation………. Slide 13 Source Credits………. Slide 14 End……… Slide 15

My name is Jamere Hill. I was born and raised in Peoria, IL and moved to Houston after completing my first degree in I received my B.S. in Marketing at Southern Illinois University and got my first REAL job as a Recruiter a few months after. Although I do love what I do, I can’t see myself recruiting for the next 30 years or so which is why I’m back in school. I have a very strong interest in computer programming and coding and have taught myself some very basic principles. My short term goal is to get a job in the field after graduating but eventually, I hope that I can become skilled enough to start my own business. My Introduction

WHAT IS INFORMATION SYSTEMS SECURITY? Computer Information Security is multidisciplinary area of study and professional activity which is concerned with the development and implementation of security mechanisms of all available types in order to keep information in all its locations and, consequently, information systems, where information is created, processed, stored, transmitted and destroyed, free from threats Source:

THREATS TO INFORMATION SYSTEMS Though there have always been major risks, there has been increasing concern regarding the safety of personal data in computer and information systems. With some of the worlds largest and most influential organizations experiencing more and more data breaches, people are starting to look for answers. There are multiple types of security threats that companies and individuals should be aware of. These threats include: Trojans Viruses and worms Denial of service Malware Payloads Rootkits Keyloggers Eavesdropping

A GROWING CONCERN This is a video about Targets recent data breach. Target is just one of many organizations who have had their information systems infiltrated

A GROWING CONCERN CON’T…… Multiple organizations have experienced major data breaches in the past few years. These breaches consequently affect the personal and financial data of their customers and clients. Companies that have experienced recent data breaches include: Home Depot Target Corporation TJX Companies Adobe Systems Zappos

CONSEQUENCES OF HACKED INFORMATION SYSTEMS Loss of access to computer, or other systems Loss of personal information on computer or other systems Bank Accounts and other financial data Photos Videos “High volume traffic” which will slow down the whole system Infection of other systems Illegally distributing music, movies, software and other illegal media This could be interpreted as he user of computer conducting these acts Spam and Phishing s

CURRENT SOLUTIONS AND DEFENSES Access Control Systems Antivirus Software Secure Coding Security by design Secure Operating Systems Authorization Firewalls Intrusion detection system Intrusion prevention system Mobile secure gateway

NEW APPROACHES TO SECURITY According to Energy.Gov, Todays approach to information security is not as effective as it once was and is not sustainable. Information systems are rapidly growing and mobile due to technologies like cloud servers. Your information is everywhere and anyone with skills at hacking can gain access to it. Improving security will be difficult because hardware and software supply chains are not centralized and there are no paths to detect-free systems, but it is still possible.

NEW APPROACHES TO SECURITY CON’T…. According to Energy.Gov, we need to get away from trying to protect entire networks and protect critical missions. This involves: Knowing the network and activities in full-scale and real-time Predicting network behaviors Adapting threat protection to specific activities and environments

SOURCE CREDITS

THE END