SlideShare une entreprise Scribd logo
1  sur  65
Télécharger pour lire hors ligne
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Information Security
Sukant Kole
Advanced Centre for Informatics & Innovative Learning
Indira Gandhi National Open University, New Delhi
August 24, 2010
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
What is Information Security ?
Definition
Information Security means protection of information and
information system from unauthorized access, modification and
misuse of information or destruction.
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
What is Information Security ?
Definition
Information Security means protection of information and
information system from unauthorized access, modification and
misuse of information or destruction.
Impact of Weather Forecasting & Flight Scheduling System
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Integrity
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Integrity
Confidentiality
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Integrity
Confidentiality
Availability
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Integrity
Confidentiality
Availability
Security
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Integrity
Confidentiality
Availability
Security
Privacy
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Cyber Espionage
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Access restriction to datacentre, Security surveillance,
Disaster Recovery
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Access restriction to datacentre, Security surveillance,
Disaster Recovery
VLAN, Authentication Authorization & Auditing service,
WPA-PSK
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Access restriction to datacentre, Security surveillance,
Disaster Recovery
VLAN, Authentication Authorization & Auditing service,
WPA-PSK
Security patches, Stable version, 3 tier architecture
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
What is encryption ?
Definition
“....In cryptography, encryption is the process of transforming
information (referred to as plaintext) using an algorithm (called
cipher) to make it unreadable to anyone except those possessing
special knowledge, usually referred to as a key. The result of the
process is encrypted information (in cryptography, referred to as
ciphertext....” (Source: Wikipedia)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Symmetric Encryption
(Ref: http://www.devx.com/dbzone/Article/29232/1954)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Asymmetric Encryption
(Ref: www.uic.edu/depts/accc/newsletter/adn26/figure2.html)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies (Password, Resource Access)
IT Policies
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies (Password, Resource Access)
IT Policies
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies (Password, Resource Access)
IT Policies (Backup, firewall, IDS & IPS)
General
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies (Password, Resource Access)
IT Policies (Backup, firewall, IDS & IPS)
General
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies (Password, Resource Access)
IT Policies (Backup, firewall, IDS & IPS)
General (Service License Agreement, Business Continuity)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Worm
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Worm
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Social Engineering attacks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Definition
“....In the field of networking, the specialist area of network
security consists of the provisions and policies adopted by the
network administrator to prevent and monitor unauthorized access,
misuse, modification, or denial of the computer network and
network-accessible resources....” (Source: Wikipedia)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,
Packet flooding)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,
Packet flooding)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,
Packet flooding)
Unauthorized access to resources (unsecured LAN /WLAN
network points)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,
Packet flooding)
Unauthorized access to resources (unsecured LAN /WLAN
network points)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,
Packet flooding)
Unauthorized access to resources (unsecured LAN /WLAN
network points)
MAC Spoofing, Man-in-the-middle attack
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Vulnerability Assessment tools (Nessus, Wireshark)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Vulnerability Assessment tools (Nessus, Wireshark)
Penetration Testing assessment
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
De-Militarized Zones
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
De-Militarized Zones
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
De-Militarized Zones
Virtual LANs
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
De-Militarized Zones
Virtual LANs
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
De-Militarized Zones
Virtual LANs
Authentication, Authorization, Auditing Service (Desktop,
Web)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Contenu connexe

Tendances

Use GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouUse GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouCameronTait3
 
Security threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerceSecurity threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerceDinesh Kumar Aggarwal
 
08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...IAESIJEECS
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Voice communication security
Voice communication securityVoice communication security
Voice communication securityFabio Pietrosanti
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Security B-Sides
 
1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt1 Info Sec+Risk Mgmt
1 Info Sec+Risk MgmtAlfred Ouyang
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...idsecconf
 
Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015Timothy Nolan
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1Irsandi Hasan
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)Wail Hassan
 

Tendances (20)

Use GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouUse GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With You
 
Security threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerceSecurity threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerce
 
08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
 
Securing VoIP Networks
Securing VoIP NetworksSecuring VoIP Networks
Securing VoIP Networks
 
CV_A-Barakat
CV_A-BarakatCV_A-Barakat
CV_A-Barakat
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
Hacking3e ppt ch11
Hacking3e ppt ch11Hacking3e ppt ch11
Hacking3e ppt ch11
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)
 

Similaire à Information Security: DBPO

CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfJayaMalaR6
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk MitigationMukalele Rogers
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetRichardus Indrajit
 
The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...lior mazor
 
Information security[277]
Information security[277]Information security[277]
Information security[277]Timothy Warren
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummiesV-ICT-OR
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
 
ISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptxISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptxMukesh Pant
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Leonardo
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxlevimax2
 

Similaire à Information Security: DBPO (20)

CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
ISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptxISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptx
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 
Security in it
Security in it Security in it
Security in it
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 

Dernier

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Dernier (20)

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Information Security: DBPO

  • 1. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Information Security Sukant Kole Advanced Centre for Informatics & Innovative Learning Indira Gandhi National Open University, New Delhi August 24, 2010 Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 2. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies What is Information Security ? Definition Information Security means protection of information and information system from unauthorized access, modification and misuse of information or destruction. Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 3. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies What is Information Security ? Definition Information Security means protection of information and information system from unauthorized access, modification and misuse of information or destruction. Impact of Weather Forecasting & Flight Scheduling System Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 4. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Integrity Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 5. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Integrity Confidentiality Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 6. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Integrity Confidentiality Availability Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 7. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Integrity Confidentiality Availability Security Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 8. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Integrity Confidentiality Availability Security Privacy Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 9. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 10. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 11. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 12. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 13. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 14. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 15. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 16. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 17. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 18. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Cloud computing security Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 19. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Cloud computing security Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 20. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Cloud computing security Cyber Espionage Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 21. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Access restriction to datacentre, Security surveillance, Disaster Recovery Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 22. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Access restriction to datacentre, Security surveillance, Disaster Recovery VLAN, Authentication Authorization & Auditing service, WPA-PSK Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 23. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Access restriction to datacentre, Security surveillance, Disaster Recovery VLAN, Authentication Authorization & Auditing service, WPA-PSK Security patches, Stable version, 3 tier architecture Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 24. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies What is encryption ? Definition “....In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext....” (Source: Wikipedia) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 25. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Symmetric Encryption (Ref: http://www.devx.com/dbzone/Article/29232/1954) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 26. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Asymmetric Encryption (Ref: www.uic.edu/depts/accc/newsletter/adn26/figure2.html) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 27. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 28. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 29. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies (Password, Resource Access) IT Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 30. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies (Password, Resource Access) IT Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 31. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies (Password, Resource Access) IT Policies (Backup, firewall, IDS & IPS) General Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 32. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies (Password, Resource Access) IT Policies (Backup, firewall, IDS & IPS) General Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 33. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies (Password, Resource Access) IT Policies (Backup, firewall, IDS & IPS) General (Service License Agreement, Business Continuity) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 34. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 35. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 36. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 37. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 38. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 39. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 40. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 41. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 42. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm (Morris Worm, November 2, 1988) Trojan Horses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 43. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm (Morris Worm, November 2, 1988) Trojan Horses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 44. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm (Morris Worm, November 2, 1988) Trojan Horses Social Engineering attacks Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 45. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Definition “....In the field of networking, the specialist area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources....” (Source: Wikipedia) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 46. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 47. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 48. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Unauthorized access to resources (unsecured LAN /WLAN network points) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 49. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Unauthorized access to resources (unsecured LAN /WLAN network points) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 50. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Unauthorized access to resources (unsecured LAN /WLAN network points) MAC Spoofing, Man-in-the-middle attack Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 51. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 52. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 53. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 54. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 55. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 56. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 57. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Directory Services (LDAP, MS-ADS) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 58. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Directory Services (LDAP, MS-ADS) Vulnerability Assessment tools (Nessus, Wireshark) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 59. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Directory Services (LDAP, MS-ADS) Vulnerability Assessment tools (Nessus, Wireshark) Penetration Testing assessment Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 60. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices De-Militarized Zones Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 61. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices De-Militarized Zones Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 62. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices De-Militarized Zones Virtual LANs Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 63. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices De-Militarized Zones Virtual LANs Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 64. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices De-Militarized Zones Virtual LANs Authentication, Authorization, Auditing Service (Desktop, Web) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 65. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting