Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.

Slides:



Advertisements
Similar presentations
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Advertisements

CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
BUSINESS PLUG-IN B6 Information Security.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
CSA 223 network and web security Chapter one
22 November Security and Privacy  Security: the protection of data, networks and computing power  Privacy: complying with a person's desires when.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
E-Commerce Security and Fraud Issues and Protections
Threats and Attacks Principles of Information Security, 2nd Edition
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CSUN Information Systems IS312 Information Systems for Business Lecture 9 Ethic & Information Security.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Securing Information Systems
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
ISEC0511 Programming for Information System Security
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
CHAPTER 4 Information Security. Key Information Security Terms Information Security refers to all of the processes and policies designed to protect an.
BUSINESS B1 Information Security.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
Chapter 4 Application Level Security in Cellular Networks.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
Denial of Service (DoS) Attacks: A Nightmare for eCommerce Jearanai Muangsuwan Strayer University.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B6 Information Security.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Security.
Chap1: Is there a Security Problem in Computing?.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
Security Operations Chapter 11 Part 3 Pages 1279 to 1309.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Building a security strategy By Raef Mchaymech. Our Case of study This is the company that we need to secure its information system.
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
BUSINESS DRIVEN TECHNOLOGY
Network Security (the Internet Security)
Network security threats
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
CHAPTER 4 Information Security.
Securing Information Systems
Security in Networking
امنیت اطلاعات و ضرورت آن
E-Commerce Security and Fraud Issues and Protections
Chapter 9 E-Commerce Security and Fraud Protection
Mohammad Alauthman Computer Security Mohammad Alauthman
Protection Mechanisms in Security Management
Presentation transcript:

Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to compensate, partially or fully, for vulnerabilities someone who intentionally attempts to violate security

More Definitions an attack has succeeded (causes the security system to fail) an attempt to exploit vulnerabilities potential for a breach probability of a breach in conjunction with the cost of the resultant damage the method, medium mode of delivery for an attack

Security Crash Course

Authentication Authentication is a process for verifying identity (and possibly ownership). authentication factors To authenticate requires something more than the object being authenticated. 2-factor authentication Authentication is often followed by ______________.

Complexity yet another hacker advantage Complexity yet another hacker advantage __________________ are ever more complex.

Common Threats/Attacks What are they? virus/worm spoofing shoulder surfing packet sniffing denial of service (DoS) malware replay

What are they? logic bomb cracking (password or encryption) social engineering session hijacking spyware & keyloging bot / DDoS backdoor physical theft or vandalism More Threats/Attacks

The Goals of Mitigation

Threat Mitigation Methods Physical authentication device (locks, card readers, biometric scanners, etc.) surveillance system

Threat Mitigation Methods Network firewall security protocol intrusion detection system (IDS) honeypot

Threat Mitigation Methods Software firewall encryption (including digital signature) intrusion detection system (IDS) authorization system anti-virus software backup system audit/logging SPAM filter software upgrade/patch