Presentation is loading. Please wait.

Presentation is loading. Please wait.

UNIT V Security Management of Information Technology.

Similar presentations


Presentation on theme: "UNIT V Security Management of Information Technology."— Presentation transcript:

1 UNIT V Security Management of Information Technology

2 Security Management The goal of security management is the accuracy, integrity, and safety of all information system processes and resources. II MBA A.MIS.RR.2011 Batch 2

3 Tools of Security Management Internetworked Security Defenses Encryption Firewalls Denial of Service Defenses E-mail Monitoring Virus defenses Other security measures to protect systems and Network Security codes Back up files Security monitors Biometric security Computer Failure Controls Fault tolerant System Disaster Recovery

4 Internetworked Security Defenses Encryption Data is transmitted in scrambled form It is unscrambled by computer systems for authorized users only The most widely used method uses a pair of public and private keys unique to each individual Firewalls A gatekeeper system that protects a company’s intranets and other computer networks from intrusion Provides a filter and safe transfer point for access to/from the Internet and other networks Important for individuals who connect to the Internet with DSL or cable modems Can deter hacking, but cannot prevent it II MBA A.MIS.RR.2011 Batch 4

5 Public/Private Key Encryption II MBA A.MIS.RR.2011 Batch 5

6 Internet and Intranet Firewalls II MBA A.MIS.RR.2011 Batch 6

7 Denial of Service Defenses Steps the organisation’ s can take to protect themselves from DDOS attacks ( distributed denial of service ) At the zombie machines set and enforce security policies Scan for vulnerabilities At the ISP monitor and block traffic spikes At the victim’s website create backup servers and network connections II MBA A.MIS.RR.2011 Batch 7

8 Internetworked Security Defenses (contd..) E-mail Monitoring use of content monitoring software that scans for troublesome words that might compromise corporate security Virus Defenses centralize the distribution and updating of antivirus software Use a security suite that integrates virus protection with firewalls, Web security, and content blocking features II MBA A.MIS.RR.2011 Batch 8

9 Other Security Measures Security Codes multilevel password system used to gain access into the system Encrypted passwords Smart cards with microprocessors Backup Files duplicate files of data or programs Security Monitors software that monitors the use of computer systems and networks and protects them from unauthorized use, fraud, and destruction Biometrics computer devices that measure physical traits that make each individual unique Voice recognition, fingerprints, retina scan Computer Failure Controls devices used to prevent computer failure or minimize its effects Preventive maintenance Arrange backups with a disaster recovery organization II MBA A.MIS.RR.2011 Batch 9

10 Fault Tolerant Systems In the event of a system failure, fault-tolerant systems have redundant processors, peripherals, and software that provide Fail-over capability: shifts to back up components Fail-save capability: the system continues to operate at the same level Fail-soft capability: the system continues to operate at a reduced but acceptable level II MBA A.MIS.RR.2011 Batch 10

11 Disaster Recover A disaster recovery plan contains formalized procedures to follow in the event of a disaster Which employees will participate What their duties will be What hardware, software, and facilities will be used Priority of applications that will be processed Use of alternative facilities Offsite storage of databases II MBA A.MIS.RR.2011 Batch 11

12 Information System Controls Methods and devices that attempt to ensure the accuracy, validity, and propriety of information system activities

13 Auditing IT Security IT Security Audits Performed by internal or external auditors Review and evaluation of security measures and management policies Goal is to ensure that that proper and adequate measures and policies are in place II MBA A.MIS.RR.2011 Batch 13

14 Security Management for Internet Users II MBA A.MIS.RR.2011 Batch 14

15 II MBA A.MIS.RR.2011 Batch 15

16 II MBA A.MIS.RR.2011 Batch 16

17

18 DSL When you connect to the Internet, you might connect through a regular modem, through a local-area network connection in your office, through a cable modem or through a digital subscriber line(DSL) connection. DSL is a very high-speed connection that uses the same wires as a regulartelephone line.modemlocal-area networkcable modemtelephone line Here are some advantages of DSL: You can leave your Internet connection open and still use the phone line for voice calls. The speed is much higher than a regular modem DSL doesn't necessarily require new wiring; it can use the phone line you already have. The company that offers DSL will usually provide the modem as part of the installation. But there are disadvantages: A DSL connection works better when you are closer to the provider's central office. The farther away you get from the central office, the weaker the signal becomes. The connection is faster for receiving data than it is for sending data over the Internet. The service is not available everywhere.


Download ppt "UNIT V Security Management of Information Technology."

Similar presentations


Ads by Google