Download presentation
Presentation is loading. Please wait.
Published bySuzan Shepherd Modified over 8 years ago
1
UNIT V Security Management of Information Technology
2
Security Management The goal of security management is the accuracy, integrity, and safety of all information system processes and resources. II MBA A.MIS.RR.2011 Batch 2
3
Tools of Security Management Internetworked Security Defenses Encryption Firewalls Denial of Service Defenses E-mail Monitoring Virus defenses Other security measures to protect systems and Network Security codes Back up files Security monitors Biometric security Computer Failure Controls Fault tolerant System Disaster Recovery
4
Internetworked Security Defenses Encryption Data is transmitted in scrambled form It is unscrambled by computer systems for authorized users only The most widely used method uses a pair of public and private keys unique to each individual Firewalls A gatekeeper system that protects a company’s intranets and other computer networks from intrusion Provides a filter and safe transfer point for access to/from the Internet and other networks Important for individuals who connect to the Internet with DSL or cable modems Can deter hacking, but cannot prevent it II MBA A.MIS.RR.2011 Batch 4
5
Public/Private Key Encryption II MBA A.MIS.RR.2011 Batch 5
6
Internet and Intranet Firewalls II MBA A.MIS.RR.2011 Batch 6
7
Denial of Service Defenses Steps the organisation’ s can take to protect themselves from DDOS attacks ( distributed denial of service ) At the zombie machines set and enforce security policies Scan for vulnerabilities At the ISP monitor and block traffic spikes At the victim’s website create backup servers and network connections II MBA A.MIS.RR.2011 Batch 7
8
Internetworked Security Defenses (contd..) E-mail Monitoring use of content monitoring software that scans for troublesome words that might compromise corporate security Virus Defenses centralize the distribution and updating of antivirus software Use a security suite that integrates virus protection with firewalls, Web security, and content blocking features II MBA A.MIS.RR.2011 Batch 8
9
Other Security Measures Security Codes multilevel password system used to gain access into the system Encrypted passwords Smart cards with microprocessors Backup Files duplicate files of data or programs Security Monitors software that monitors the use of computer systems and networks and protects them from unauthorized use, fraud, and destruction Biometrics computer devices that measure physical traits that make each individual unique Voice recognition, fingerprints, retina scan Computer Failure Controls devices used to prevent computer failure or minimize its effects Preventive maintenance Arrange backups with a disaster recovery organization II MBA A.MIS.RR.2011 Batch 9
10
Fault Tolerant Systems In the event of a system failure, fault-tolerant systems have redundant processors, peripherals, and software that provide Fail-over capability: shifts to back up components Fail-save capability: the system continues to operate at the same level Fail-soft capability: the system continues to operate at a reduced but acceptable level II MBA A.MIS.RR.2011 Batch 10
11
Disaster Recover A disaster recovery plan contains formalized procedures to follow in the event of a disaster Which employees will participate What their duties will be What hardware, software, and facilities will be used Priority of applications that will be processed Use of alternative facilities Offsite storage of databases II MBA A.MIS.RR.2011 Batch 11
12
Information System Controls Methods and devices that attempt to ensure the accuracy, validity, and propriety of information system activities
13
Auditing IT Security IT Security Audits Performed by internal or external auditors Review and evaluation of security measures and management policies Goal is to ensure that that proper and adequate measures and policies are in place II MBA A.MIS.RR.2011 Batch 13
14
Security Management for Internet Users II MBA A.MIS.RR.2011 Batch 14
15
II MBA A.MIS.RR.2011 Batch 15
16
II MBA A.MIS.RR.2011 Batch 16
18
DSL When you connect to the Internet, you might connect through a regular modem, through a local-area network connection in your office, through a cable modem or through a digital subscriber line(DSL) connection. DSL is a very high-speed connection that uses the same wires as a regulartelephone line.modemlocal-area networkcable modemtelephone line Here are some advantages of DSL: You can leave your Internet connection open and still use the phone line for voice calls. The speed is much higher than a regular modem DSL doesn't necessarily require new wiring; it can use the phone line you already have. The company that offers DSL will usually provide the modem as part of the installation. But there are disadvantages: A DSL connection works better when you are closer to the provider's central office. The farther away you get from the central office, the weaker the signal becomes. The connection is faster for receiving data than it is for sending data over the Internet. The service is not available everywhere.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.