Presentation is loading. Please wait.

Presentation is loading. Please wait.

Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.

Similar presentations


Presentation on theme: "Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY."— Presentation transcript:

1 Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY

2  Information Security:  Encompassing the protection of information from accidental or intentional misuse from people  Primary tool used to combat threats associated with downtime PROTECTING INTELLECTUAL ASSETS

3  Downtime:  A period of time when systems are unavailable that results in lost revenues and legal expenses  Primary reasons downtime occurs are power loss and hackers PROTECTING INTELLECTUAL ASSETS

4  Hackers:  Technology experts who break into computers for either a profit or a challenge  Good or Bad:  Hactivists  White-hat hackers  Black-hat hackers  Crackers SECURITY THREATS

5  Virus:  Software written with intent to annoy or cause damage  Forms:  Denial of Service (DoS)  Trojan Horse  Worm SECURITY THREATS

6  Adware:  Software that allows internet advertisers to display ads without consent of the user  Spyware:  Special adware that collects data about the user and transmits it over the user without the users knowledge SECURITY THREATS

7  Antivirus Software  Finds and removes know viruses, adware and spyware.  Keep up to date to protect from new viruses! SECURITY THREATS

8  Information Security Plan  Detailed process of how a organization will implement information security policies  Information Security Policies  Identifying rules to maintain information security PROTECTING AGAINST HACKERS

9  Authorization:  Process of providing a user with permission including access levels and file access  Authentication:  methods for confirming user’s identities  User ID and Password  Smart Card or Token  Fingerprints TECHNOLOGY DEFENSES

10  Content Filtering  Software that filters content such as emails to prevent unauthorized information  Encryption  scrambles information into an alternative form that requires a password to decrypt  Firewall  Software that guards a network by analyzing incoming and outgoing information for the correct markings DATA PREVENTION & RESISTANCE

11  Intrusion Detection Software (IDS):  Monitoring tools that search for patterns in network traffic to identify intruders  Protects against suspicious network traffic and attempts to access files and data DETECTION & RESPONSE

12 1.What is one of the primary reasons for the occurrence of downtime? 2.What type of hacker uses their ability for good? 3.What does Spyware do? 4.Name of the methods used for confirming a user’s identity 5.What is the purpose of Intrusion Detection Software? QUESTIONS


Download ppt "Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY."

Similar presentations


Ads by Google