Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.

Slides:



Advertisements
Similar presentations
IS 376 NOVEMBER 5, DATA BREACH INVESTIGATIONS REPORT By The Verizon RISK Team Research Investigations Solutions Knowledge.
Advertisements

Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
POSSIBLE THREATS TO DATA
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Mr C Johnston ICT Teacher
Security+ Guide to Network Security Fundamentals
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Chapter Nine Maintaining a Computer Part III: Malware.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
BUSINESS B1 Information Security.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
For more notes and topics visit: eITnotes.com.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
W elcome to our Presentation. Presentation Topic Virus.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Chapter 40 Internet Security.
Instructor Materials Chapter 7 Network Security
Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.
Technology Mrs. Huddleston
G061 - Network Security.
Presentation transcript:

Security strategy

What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets. This will cover the physical configuration, software, and information handling and user practices. How an organisation plans to protect and respond to security attacks on their information technology assets. This will cover the physical configuration, software, and information handling and user practices. All organisations suffer from breaches of security. These can range from innocent attempts to access restricted resources to deliberate and prolonged attempts on computer systems and networks. All organisations suffer from breaches of security. These can range from innocent attempts to access restricted resources to deliberate and prolonged attempts on computer systems and networks.

Privacy of Data Privacy is an individual’s right to be secure from unauthorised disclosure of information about them stored in documents and computer files. Organisations have a duty to protect the privacy of data which they hold about members of the public and their staff, and to process this data only in the manner for which it was intended. Privacy is an individual’s right to be secure from unauthorised disclosure of information about them stored in documents and computer files. Organisations have a duty to protect the privacy of data which they hold about members of the public and their staff, and to process this data only in the manner for which it was intended.

Viruses, Trojans, Worms Virus A virus is a program or piece of code that, without your knowledge, is loaded and run on your computer. Viruses can also replicate themselves, normally by attaching themselves to existing program files. A virus is a program or piece of code that, without your knowledge, is loaded and run on your computer. Viruses can also replicate themselves, normally by attaching themselves to existing program files. Trojan horse A Trojan horse is a destructive program that pretends to be a helpful application of file. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. A Trojan horse is a destructive program that pretends to be a helpful application of file. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.

Worm A worm is a self-replicating program that reproduces itself over a network, using the resources on one machine (processor time, memory, hard disk, network connection, etc.) to attack other machines. A worm is not quite the same as a virus, which is normally a piece of program code that inserts itself into other programs. A worm is a self-replicating program that reproduces itself over a network, using the resources on one machine (processor time, memory, hard disk, network connection, etc.) to attack other machines. A worm is not quite the same as a virus, which is normally a piece of program code that inserts itself into other programs. Anti-virus software An antivirus utility searches a hard disk for viruses and removes any that are found. Most antivirus programs also offer a level of protection against Trojans and worms. An antivirus utility searches a hard disk for viruses and removes any that are found. Most antivirus programs also offer a level of protection against Trojans and worms.

Data Security Refers to the level of protection data stored within the organisation has from unauthorised access, and potential data loss due to failure of hardware and/or software. Refers to the level of protection data stored within the organisation has from unauthorised access, and potential data loss due to failure of hardware and/or software. Unauthorised access can be within or from outside the organisation, intentional or unintentional. There are a number of methods which can be used to prevent or reduce the risk of unauthorised access. Unauthorised access can be within or from outside the organisation, intentional or unintentional. There are a number of methods which can be used to prevent or reduce the risk of unauthorised access.

Access rights An organisation can protect sensitive data from unauthorised access using a system of security access rights or privileges which are allocated to users. Access to data is then restricted to only those users who have been allocated the appropriate security access rights An organisation can protect sensitive data from unauthorised access using a system of security access rights or privileges which are allocated to users. Access to data is then restricted to only those users who have been allocated the appropriate security access rights Access rights can be allocated to specific network devices which limits access to sensitive data from those devices regardless of the access rights of the individual user Access rights can be allocated to specific network devices which limits access to sensitive data from those devices regardless of the access rights of the individual user

These access rights differ depending on the operating system being used, but of the rights involve: Read – authority to read specific data Read – authority to read specific data Write – authority to write data (i.e. create, modify and delete) Write – authority to write data (i.e. create, modify and delete) Create – authority to create data but not to modify or delete it Create – authority to create data but not to modify or delete it Delete – authority to delete data Delete – authority to delete data Modify – authority to make changes to data Modify – authority to make changes to data Execute – authority to run programs on a particular computer. Execute – authority to run programs on a particular computer.

Encryption The process of changing data into a form that can be read only by the intended receiver. To decipher the message, the receiver of the encrypted data must have the proper decryption key. In traditional schemes, the sender and the receiver use the same key to encrypt and decrypt data. The process of changing data into a form that can be read only by the intended receiver. To decipher the message, the receiver of the encrypted data must have the proper decryption key. In traditional schemes, the sender and the receiver use the same key to encrypt and decrypt data.

Firewall The original meaning of firewall was ‘a wall constructed to prevent the spread of fire’. Computer firewalls are constructed to prevent unwanted intrusions from the Internet or other network into a PC or network. A firewall is required because threats arise when an attacker exploits a combination of PC’s unique IP address and one or more of the thousands of CP and UDP ports that are used for communications over the network. The original meaning of firewall was ‘a wall constructed to prevent the spread of fire’. Computer firewalls are constructed to prevent unwanted intrusions from the Internet or other network into a PC or network. A firewall is required because threats arise when an attacker exploits a combination of PC’s unique IP address and one or more of the thousands of CP and UDP ports that are used for communications over the network.