Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security in the Workplace: Information Assurance

Similar presentations


Presentation on theme: "Security in the Workplace: Information Assurance"— Presentation transcript:

1 Security in the Workplace: Information Assurance
Team 1: Mohamed Eid, Wendy Eid, Veronica Austin and Laura Gunsell-Shields

2 What is a network? A network is defined as an interconnection of three or more communicating entities. These entities are usually passive electronic components that perform a specific function (usually limited in scope).

3 Security Management In Network Management, this is the set of functions that protect the system from unauthorized access by persons, acts or influences and that includes many sub functions.

4 Security Implementation
Procedure Manual Internal/External Access Control Employee Customer Control of Information Security Alerts

5 Intrusion of Networks Main focus is to avoid intrusion and to protect against individuals from destroying and damaging your computer and files, whether intentionally or accidentally. Intrusion can cost a company millions of dollars.

6 Security Threats

7 Dangerous Computer Geeks!?
*Old School Hackers *Cyber-Punks *Crackers *Coders

8 Hacking Techniques Scan the system Gain Initial Access
Gain Full Access Drop a backdoor Get out quick without being detected

9 ATTACK TRENDS 1980’s : Password cracking 1990’s: Session Hijacking
2000’s : War Driving & Cyber Terrorism

10 SECURITY THREATS Electronic Infections Abuse of user privileges
Denial of Service Proprietary Theft System penetration

11 CSI 2002 SURVEY REVEALED:

12 Risk Management

13 Security Concerns Managers are concerned with protecting assets and information and insuring integrity of business transactions. Customers are concerned with protecting privacy and financial transactions.

14 Improving Network Security
Firewalls Anti-virus software Restrictions on user activity

15 Firewall Emphasis is to block traffic
Serves as a security blanket for management Must be part of overall organizational security architecture

16 Guidelines for Anti-Virus Process
Always run the anti-virus software Never open any files or macros attached to an from an unknown source Delete Spam, chain, or other junk without opening or forwarding Never download files from unknown sources Backup critical data Update anti-virus software periodically

17 Password Protection Frontline defense in computer/network security
Change passwords on a regular basis

18 Characters of Weak Passwords
Contain less than 8 characters Words found in the dictionary Common usage words, such as names of pets, family members etc.

19 Password Don’ts Do not reveal passwords over the phone
Do not reveal password in an Do not reveal password to a boss or co-worker Do not share passwords

20 Remote Access Users Passphrase is used for remote users by using public/private key authentication A key authentication defines the mathematical relationship between the public key (that is known) and the private key (known only to the user) A passphrase is a longer version of a password and is generally more secure

21 Recent Headlines

22 Security Watch How can we stop identity theft?
- Identity theft is on the rise, with millions of dollars lost due to fraud each year. Ready to toss that old PC? - Identity thieves have a new hoax: stealing confidential information from used hard drives. What’s wrong with anti-virus apps? - It costs too much to keep anti-virus software up-to-date.

23 More Headlines…. Is IT overspending on security? - November 20, 2002
Open Source: Rebels at the gate - October 14, 2002

24 Any Questions?


Download ppt "Security in the Workplace: Information Assurance"

Similar presentations


Ads by Google