Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Layered Security Solutions - Simplified © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!
Network Security Attack Analysis. cs490ns - cotter2 Outline Types of Attacks Vulnerabilities Exploited Network Attack Phases Attack Detection Tools.
4 Information Security.
Ethics, Privacy and Information Security
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Separate Domains of IT Infrastructure
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Network Security Overview Tales from the trenches.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
New Data Regulation Law 201 CMR TJX Video.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Information Systems
-Target -Home Depot -Jimmy John’s “No one wants their personal information or sensitive data in the wrong hands”
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Module 5: Configuring Access for Remote Clients and Networks.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Information Security MGMT Summer 2012 Night #4, Lecture Part 2.
IS Network and Telecommunications Risks Chapter Six.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Module 11: Designing Security for Network Perimeters.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
What is Spam? d min.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Security and Ethics Safeguards and Codes of Conduct.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Chapter 10 Studycast Marilee Betz.  is NOT private or confidential.  Created by committees.  Vary  GAME PLAN  Common elements  Glossary of.
Policies and Security for Internet Access
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
1 Figure 1-6: Attacks and Defenses (Study Figure) Access Control  Access control is the body of strategies and practices that a company uses to prevent.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Network System Security - Task 2. Russell Johnston.
Working at a Small-to-Medium Business or ISP – Chapter 8
CHAPTER FOUR OVERVIEW SECTION ETHICS
TECHNOLOGY GUIDE THREE
Capabilities Matrix Access and Authentication
Network security threats
Data Compromises: A Tax Practitioners “Nightmare”
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Matt G change over point ?
ISMS Information Security Management System
Identity & Access Management
Implementing Client Security on Windows 2000 and Windows XP Level 150
Unit 4 IT Security Kerris Davies.
Networking for Home and Small Businesses – Chapter 8
CHAPTER FOUR OVERVIEW SECTION ETHICS
Online Learning.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Cybersecurity at WAJ What is it? Are we at risk?.
Presentation transcript:

Data Security Overview

Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware –Internal (client) firewalls –Policies Acceptable Use Password Security & Access Levels Protecting Private Data; Backup tapes Removable Media – intellectual property

Data Security Internal (Continued) –Human & Social Engineering ; Phishing Phone etiquette; “surveys”, etc. Informed Users – know what & what not to expect Remote Users –VPN’s –Smart cards; Authentication –Wireless access points –Laptop data encryption SOX Compliance Issues