security in it (data and cyber security)

Senior Technical Project Manager (Software) à Efuturesworld Private Limited
6 Jan 2016
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
security in it (data and cyber security)
1 sur 32

Contenu connexe

Tendances

ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...Michael Lew
01 computing01 computing
01 computingSulman Ahmed
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of ITMaria Stella Solon
Uit9 ppt ch09_au_revUit9 ppt ch09_au_rev
Uit9 ppt ch09_au_revidrissss dddd
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsDyuti Islam
Ethic02Ethic02
Ethic02Larcyneil Pascual

En vedette

Policies & Laws in IT industryPolicies & Laws in IT industry
Policies & Laws in IT industryRohana K Amarakoon
Professional bodies in ITProfessional bodies in IT
Professional bodies in ITRohana K Amarakoon
New Product Management   AIB (MBA) 2016New Product Management   AIB (MBA) 2016
New Product Management AIB (MBA) 2016Rohana K Amarakoon
Nature of the it professionNature of the it profession
Nature of the it professionRohana K Amarakoon
Entrepreneurship AIB (MBA) 2016Entrepreneurship AIB (MBA) 2016
Entrepreneurship AIB (MBA) 2016Rohana K Amarakoon
Project Management - AIB (MBA)Project Management - AIB (MBA)
Project Management - AIB (MBA)Rohana K Amarakoon

Similaire à security in it (data and cyber security)

Security & Privacy - Lecture ASecurity & Privacy - Lecture A
Security & Privacy - Lecture ACMDLearning
Chapter 1.pptChapter 1.ppt
Chapter 1.pptabrahamermias1
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
Class activity 4 Class activity 4
Class activity 4 Jeewanthi Fernando
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3Asad Zaman

Plus de Rohana K Amarakoon

Importance of education to everyone & how to improve educationImportance of education to everyone & how to improve education
Importance of education to everyone & how to improve educationRohana K Amarakoon
How to enhance social awareness on NCD's and STD'sHow to enhance social awareness on NCD's and STD's
How to enhance social awareness on NCD's and STD'sRohana K Amarakoon
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European unionRohana K Amarakoon
What is agile?What is agile?
What is agile?Rohana K Amarakoon
Effective communicationEffective communication
Effective communicationRohana K Amarakoon
Software Change request formSoftware Change request form
Software Change request formRohana K Amarakoon

Dernier

DevOps and SF.pdfDevOps and SF.pdf
DevOps and SF.pdfPatrickYANG48
Semantic Search_ NLP_ ML.pdfSemantic Search_ NLP_ ML.pdf
Semantic Search_ NLP_ ML.pdfPlamenaDzharadat
Climate Impact of Software TestingClimate Impact of Software Testing
Climate Impact of Software TestingKari Kakkonen
Deckible POV - Point of ViewDeckible POV - Point of View
Deckible POV - Point of ViewNick Kellet
BMC Software.pptxBMC Software.pptx
BMC Software.pptxCloudaction
What is Microsoft Power BI used for.pptxWhat is Microsoft Power BI used for.pptx
What is Microsoft Power BI used for.pptxJohnCommuserv

security in it (data and cyber security)

Notes de l'éditeur

  1. In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.
  2. IP controllers. Controllers are connected to a host PC via Ethernet LAN or WAN. Data Masking is the process of hiding specific data within a database table or cell to ensure that data security is maintained and that sensitive information is not exposed to unauthorized personnel.
  3. UK Data Protection Act 1998 makes new provisions for the regulation of the processing of information relating to individuals, including the obtaining, holding, use or disclosure of such information. The European Union Data Protection Directive (EUDPD) requires that all EU member must adopt national regulations to standardize the protection of data privacy for citizens throughout the EU. The Computer Misuse Act 1990 is an Act of the UK Parliament making computer crime (e.g. hacking) a criminal offence. The Act has become a model upon which several other countries including Canada and the Republic of Ireland have drawn inspiration when subsequently drafting their own information security laws. EU Data Retention laws requires Internet service providers and phone companies to keep data on every electronic message sent and phone call made for between six months and two years. Federal Financial Institutions Examination Council’s (FFIEC) security guidelines for auditors specifies requirements for online banking security. Health Insurance Portability and Accountability Act (HIPAA) of 1996 requires the adoption of national standards for electronic health care transactions and national identifiers for providers, health insurance plans, and employers. And, it requires health care providers, insurance providers and employers to safeguard the security and privacy of health data. Gramm–Leach–Bliley Act of 1999 (GLBA), also known as the Financial Services Modernization Act of 1999, protects the privacy and security of private financial information that financial institutions collect, hold, and process. Payment Card Industry Data Security Standard (PCI DSS) establishes comprehensive requirements for enhancing payment account data security. It was developed by the founding payment brands of the PCI Security Standards Council, including American Express, Discover Financial Services, JCB, MasterCard Worldwide and Visa International, to help facilitate the broad adoption of consistent data security measures on a global basis. The PCI DSS is a multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures.
  4. User account access controls and cryptography can protect systems files and data, respectively. Firewalls are by far the most common prevention systems from a network security perspective as they can (if properly configured) shield access to internal network services, and block certain kinds of attacks through packet filtering. Firewalls can be both hardware- or software-based. Intrusion Detection System (IDS) products are designed to detect network attacks in-progress and assist in post-attack forensics, while audit trails and logs serve a similar function for individual systems. "Response" is necessarily defined by the assessed security requirements of an individual system and may cover the range from simple upgrade of protections to notification of legal authorities, counter-attacks, and the like. In some special cases, a complete destruction of the compromised system is favored, as it may happen that not all the compromised resources are detected.