Information Security Overview BA483 – May 15 th, 2006 Presented By Kris Rosenberg, CISSP, MCSE, CCNA CTO Oregon State University College of Business.

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

Principles of Information Security Kris Rosenberg, Chief Technology Officer Oregon State University College of Business Kris Rosenberg, Chief Technology.
Network Security Overview Tales from the trenches.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
Enterprise Network Security Accessing the WAN Lecture week 4.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4.
Cyber Patriot Training
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
PCI requirements in business language What can happen with the cardholder data?
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY.
PCI: As complicated as it sounds? Gerry Lawrence CTO
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Management Information Systems The Islamia University of Bahawalpur Delivered by: Tasawar Javed Lecture 17.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
DIYTP Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
In the Crossfire International Cooperation and Computer Crime Stewart Baker.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Appendix C: Designing an Operations Framework to Manage Security.
Initial Tiger Team Briefing New Dells with TPM Peter Leight Richard Hammer May 2006.
Module 6: Designing Security for Network Hosts
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
Small Business Security Keith Slagle April 24, 2007.
Enterprise Network Security Accessing the WAN – Chapter 4.
Minimizing your vulnerabilities. Lets start with properly setting up your servers which includes… Hardening your servers Setting your file and folder.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
EC4019 PA Intrusion & Access Control Technology (IACT) Prepared by: Sandy Tay TH 1 Chapter 1Overview.
Computer Security By Duncan Hall.
Networking Network Classification, by there: 3 Security And Communications software.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
NETWORK INTRUSION SECURITY BREACHES, THAT MAKE NETWORKS VULNERABLE TO UNAUTHORIZED ATTACKS.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
10 things you can do today to reduce your security risk.
Enterprise Security Management Franklin Tinsley COSC 481.
CSCE 548 Student Presentation By Manasa Suthram
Enterprise Network Security
CompTIA Server+ Certification (Exam SK0-004)
Identity & Access Management
Enterprise Network Security
Implementing Client Security on Windows 2000 and Windows XP Level 150
Networking for Home and Small Businesses – Chapter 8
Intrusion Detection system
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Enterprise Network Security
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Protection Mechanisms in Security Management
Presentation transcript:

Information Security Overview BA483 – May 15 th, 2006 Presented By Kris Rosenberg, CISSP, MCSE, CCNA CTO Oregon State University College of Business

Increasingly Hostile Public Network intruders are prepared and organized Internet attacks are easy, low risk, and hard to trace intruder tools are - increasingly sophisticated - easy to use, especially by novice intruders - designed to support large-scale attacks source code is not required to find vulnerabilities the complexity of the Internet, protocols, and applications are all increasing along with our reliance on them

Increasingly Hostile Public Network

Cost of Downtime

Basic Categories Policy Require Complex Passwords Require Complex Passwords Restrict Websites Restrict WebsitesPhysical Restricted Access Restricted Access Biometrics Biometrics Network Security Firewall Firewall IDS IDS Host Based Security Anti-Virus Software Anti-Virus Software Patches / Updates Patches / Updates

Holistic Approach Security Policy HostPhysicalNetwork