Security in IT (data and cyber security)

Senior Technical Project Manager (Software) à Efuturesworld Private Limited
10 Jan 2016
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
Security in IT (data and cyber security)
1 sur 32

Contenu connexe

Tendances

Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challengesSilvia Afrima Chandra
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityMighty Guides, Inc.
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYIJNSA Journal
Piit topic 1Piit topic 1
Piit topic 1Joash Sookram
Notes1Notes1
Notes1Nadirah Aziz
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility

En vedette

Software Quality AssuranceSoftware Quality Assurance
Software Quality AssuranceRohana K Amarakoon
New Product Management   AIB (MBA) 2016New Product Management   AIB (MBA) 2016
New Product Management AIB (MBA) 2016Rohana K Amarakoon
Nature of the it professionNature of the it profession
Nature of the it professionRohana K Amarakoon
Entrepreneurship AIB (MBA) 2016Entrepreneurship AIB (MBA) 2016
Entrepreneurship AIB (MBA) 2016Rohana K Amarakoon
Project Management - AIB (MBA)Project Management - AIB (MBA)
Project Management - AIB (MBA)Rohana K Amarakoon
Project Management Best PracticesProject Management Best Practices
Project Management Best PracticesRohana K Amarakoon

Similaire à Security in IT (data and cyber security)

Security & Privacy - Lecture ASecurity & Privacy - Lecture A
Security & Privacy - Lecture ACMDLearning
Chapter 1.pptChapter 1.ppt
Chapter 1.pptabrahamermias1
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
Class activity 4 Class activity 4
Class activity 4 Jeewanthi Fernando
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3Asad Zaman

Plus de Rohana K Amarakoon

Importance of education to everyone & how to improve educationImportance of education to everyone & how to improve education
Importance of education to everyone & how to improve educationRohana K Amarakoon
How to enhance social awareness on NCD's and STD'sHow to enhance social awareness on NCD's and STD's
How to enhance social awareness on NCD's and STD'sRohana K Amarakoon
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European unionRohana K Amarakoon
What is agile?What is agile?
What is agile?Rohana K Amarakoon
Effective communicationEffective communication
Effective communicationRohana K Amarakoon
Software Change request formSoftware Change request form
Software Change request formRohana K Amarakoon

Dernier

Citi Tech Talk  Disaster Recovery Solutions Deep DiveCiti Tech Talk  Disaster Recovery Solutions Deep Dive
Citi Tech Talk Disaster Recovery Solutions Deep Diveconfluent
Salesforce @AXA.pdfSalesforce @AXA.pdf
Salesforce @AXA.pdfPatrickYANG48
Test Automation at Scale: Lessons from Top-Performing Distributed TeamsTest Automation at Scale: Lessons from Top-Performing Distributed Teams
Test Automation at Scale: Lessons from Top-Performing Distributed TeamsApplitools
Deckible POV - Point of ViewDeckible POV - Point of View
Deckible POV - Point of ViewNick Kellet
PostgreSQL ProloguePostgreSQL Prologue
PostgreSQL PrologueMd. Golam Hossain
TorfsBot or Not? Evaluating User Perception on Imitative Text Generation (CLI...TorfsBot or Not? Evaluating User Perception on Imitative Text Generation (CLI...
TorfsBot or Not? Evaluating User Perception on Imitative Text Generation (CLI...Thomas Winters

Security in IT (data and cyber security)

Notes de l'éditeur

  1. In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.
  2. IP controllers. Controllers are connected to a host PC via Ethernet LAN or WAN. Data Masking is the process of hiding specific data within a database table or cell to ensure that data security is maintained and that sensitive information is not exposed to unauthorized personnel.
  3. UK Data Protection Act 1998 makes new provisions for the regulation of the processing of information relating to individuals, including the obtaining, holding, use or disclosure of such information. The European Union Data Protection Directive (EUDPD) requires that all EU member must adopt national regulations to standardize the protection of data privacy for citizens throughout the EU. The Computer Misuse Act 1990 is an Act of the UK Parliament making computer crime (e.g. hacking) a criminal offence. The Act has become a model upon which several other countries including Canada and the Republic of Ireland have drawn inspiration when subsequently drafting their own information security laws. EU Data Retention laws requires Internet service providers and phone companies to keep data on every electronic message sent and phone call made for between six months and two years. Federal Financial Institutions Examination Council’s (FFIEC) security guidelines for auditors specifies requirements for online banking security. Health Insurance Portability and Accountability Act (HIPAA) of 1996 requires the adoption of national standards for electronic health care transactions and national identifiers for providers, health insurance plans, and employers. And, it requires health care providers, insurance providers and employers to safeguard the security and privacy of health data. Gramm–Leach–Bliley Act of 1999 (GLBA), also known as the Financial Services Modernization Act of 1999, protects the privacy and security of private financial information that financial institutions collect, hold, and process. Payment Card Industry Data Security Standard (PCI DSS) establishes comprehensive requirements for enhancing payment account data security. It was developed by the founding payment brands of the PCI Security Standards Council, including American Express, Discover Financial Services, JCB, MasterCard Worldwide and Visa International, to help facilitate the broad adoption of consistent data security measures on a global basis. The PCI DSS is a multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures.
  4. User account access controls and cryptography can protect systems files and data, respectively. Firewalls are by far the most common prevention systems from a network security perspective as they can (if properly configured) shield access to internal network services, and block certain kinds of attacks through packet filtering. Firewalls can be both hardware- or software-based. Intrusion Detection System (IDS) products are designed to detect network attacks in-progress and assist in post-attack forensics, while audit trails and logs serve a similar function for individual systems. "Response" is necessarily defined by the assessed security requirements of an individual system and may cover the range from simple upgrade of protections to notification of legal authorities, counter-attacks, and the like. In some special cases, a complete destruction of the compromised system is favored, as it may happen that not all the compromised resources are detected.