Download presentation
Presentation is loading. Please wait.
Published byBennett Chase Modified over 9 years ago
1
MIS323 – Business Telecommunications Chapter 10 Security
2
Security Discussion Introduction to Security Corporate Security Security Breach Case How would you handle the situation? What did they do wrong and what changes would you suggest? Personal Security Personal Security Assessment Security Tools 2 Copyright 2010 John Wiley & Sons, Inc
3
10.1 Introduction Security has always been a major business concern Computers and Internet have redefined the nature of information security Laws and enforcement in cyber crime
4
Security Incidents & Financial Impact Computer security increasingly important
5
Types of Security Threats Business continuity planning related threats Intrusion
6
Network Controls Mechanisms that reduce or eliminate the threats to network security Types of controls:
7
10.2 Risk Assessment A key step in developing a secure network Assigns level of risks to various threats Use a control spreadsheet
8
10.3 Ensuring Business Continuity Make sure that organization’s data and applications will continue to operate even in the face of disruption, destruction, or disaster Continuity Plan includes two major parts: 1. 2.
9
Specifics of Continuity Plan
10
Preventing Computer Viruses Viruses spreads when infected files are accessed Worms Incoming e-mail messages are most common source of viruses
11
Preventing Denial of Service Attacks DoS attacks Distributed DoS (DDoS) Difficult to prevent DoS and DDoS attacks
12
10.4 Intrusion Prevention Types of intruders
13
Intrusion Prevention Requires a proactive approach that includes routinely testing the security systems Best rule for high security Security Policy
14
Security Holes Made by flaws in network software that permit unintended access to the network Once discovered, knowledge about the security hole quickly circulated on the Internet Examples: RSA – a fradulent email that took advantage of a hole in adobe flash
15
Preventing Social Engineering Breaking security by simply asking how Attackers impersonate others on the phone to ask for information Attackers have good social skills and can manipulate people
16
Phishing Emails
17
Managing Users Screen and classify both users and data Review the effect of any security software Provide adequate user training on network security
18
Security Used at Orgs – CSI Survey 18
19
Personal Security: Risk Assessments Disruption, Disaster and Power Loss Backup Drives Cloud computing
20
Personal Security: Risk Assessments Virus and Malware Protection Malwarebytes Antivirus Software
21
Personal Security: Risk Assessments Intrusion Secure Devices Personal Firewall Prey Project
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.