SlideShare a Scribd company logo
1 of 27
Information Security
RECIPA-IMT
• Understanding of information security and Key
concepts
• Understanding role model for having robust
Information Security Management System
Implementation
• Empowerment of Information Security Management
System through implementing best practices for
People, Process and Technology.
• Few Guidelines to maintain Network and Personal
Security
Aims
I
N
F
O
S
E
C
The Growth of Internet Crime
“Of the top five categories of offenses reported to law enforcement during
2009, non-delivered merchandise and/or payment ranked 19.9%; identity
theft, 14.1%; credit card fraud, 10.4%; auction fraud, 10.3%; and computer
fraud (destruction/damage/vandalism of property), 7.9%.”
Information Security
• What is it?
- The process in which “Confidentiality”,
“Integrity” & “Availability” of information
ensured.
• In other words:
- protecting information and information
systems from unauthorized access, use,
disclosure, disruption, modification,
perusal, inspection, recording or
destruction.
(United States Code, title 44)
Main Concepts
– Confidentiality
Preventing unauthorized
persons, or parties to get
access to the information
– Integrity
Safeguarding the accuracy and
completeness of information
and processing methods
– Availability
Ensuring access for
authorized persons/parties
anytime it’s needed.
Information classification
• Act of tagging information with labels to make divide them to
different groups.
• When it’s related to information security, It should be first
step!
• It enables to treat information in sets with similar procedures
for easier handling and better management.
Information classification
• It clarifies information usage with respect to access
control and confidentiality protection.
– First is the issue of who is qualified to determine this
– Mostly context and content dependent
– Normally can be changed by Time and Circumstances
• Best example is military classical classification
– Unclassified
– Secret
– Top secret
• In data world both “data” and “persons” are
categorized to manage access control
Confidentiality
• Confidentiality ensures that only those with the
rights and privileges to access information are able
to do so.
• Having complete Confidentiality can be impossible to
insure at times.
• Examples:
– research data,
– medical and insurance records,
– new product specifications
– corporate investment strategies.
Integrity
• Information has integrity when it is whole, complete,
and uncorrupted.
• The integrity of information is threatened when the
information is exposed to corruption, damage,
destruction, or other disruption of its authentic state.
• When information is modified in unexpected ways, the
result is known as loss of integrity.
• It defines authenticity and level of trust
Availability
• Timely, reliable access to data and information
services for authorized users, and has three main
factors;
– Reliability: degree in which a system performs its purpose
for the period of time intended under the operating conditions
encountered
– Accessibility: degree in which a system is usable by as
many people as possible without modification and is
characterized in terms of the ability of users to have physical
access to the system.
– Timeliness: is the responsiveness of a system or resource to
a user request. In fact,
Availability
• Traditionally Info AV has
mostly been measured by the
amount of time an information
resource is either processing or
not (uptime and downtime)
• Other secondary factors;
– Redundancy and thorough
system backups
– Preventative and correctative
maintenance
Possible Threats
High User
Knowledge of IT
Systems
Theft,
Sabotage,
Misuse
Virus Attacks
Systems &
Network
Failure
Lack Of
Documentation
Lapse in
Physical
Security
Natural
Calamities &
Fire
SO HOW DO
WE
OVERCOME
THESE
PROBLEMS?
Planning of InfoSec
• An Strategic view will be:
– Analysis of the current situation;
– Identification of business-strategy requirements;
– Identification of legal and regulatory requirements;
– Identification of requirements due to external trends;
– Definition of the target situation;
– Definition and prioritization of strategic initiatives;
– Distribution of the draft strategy;
– Agreement and publication of final strategy.
InfoSec Policy is approved by Top
Management
History
Early 1990
• DTI (UK) established a working group
• Information Security Management Code of Practice produced as
BSI-DISC publication
1995
• BS 7799 published as UK Standard
1999
• BS 7799 - 1:1999 second revision published
2000
• BS 7799 - 1 accepted by ISO as ISO - 17799 published
• BS 7799-2:2002 published
History
• ISO 27001:2005
Information technology — Security techniques — Information
security management systems — Requirements
• ISO 27002:2005
Information technology — Security techniques — Code of
practice for information security management
Security Triangle again
Information
Security Policy
Organisation
of Information
Security
Asset
Management
Human
Resource
Security
Physical
Security
Communication
& Operations
Management
Access Control
System
Development
&
Maintenance
Incident
Management
Business
Continuity
Planning
Compliance
Availability
A Security System Components
PEOPLE
PROCESSES
TECHNOLOGY
Technologies
• Prevention of physical access by unauthorized people
• Data Network Security by using proper access control
• Communication line Security
– Preventing eavesdroppers
– Avoid tapping to line
– Stopping intruders attacks
Technologies
• Proper Hardware design is
main Solution:
– Firewalls; Prevents
unauthorized access from
outside network
– VPN; Provides Secure
channels for transferring
sensitive information
– Antivirus; Ensures security of
stored data by stopping
worms, viruses, malwares,
Trojans
Processes
• The processes refer to "work practices" or workflow. Processes are
the repeatable steps to accomplish business objectives.
• Generally this part which managed by software in data networks
and administrative paperwork in physical environment, works
under supervision of set of rules called “Policies”
• As mentioned before Policy makers are made by strategic planners
and approved by top management.
• Asset management is main process of any InfoSec Solution
Human Factor
• People are biggest assets
• But also they are biggest threat
– More than 70% of Threats are Internal
– More than 2/3rd express their inability to determine “Whether
my systems are currently compromised?”
– Psychological manipulation “Social Engineering”
• Human awareness is most important issue
• Also handled under asset management part
THE 10 RULES OF THE SOHO INTERNET
• 1. Safeguard your computer.
• 2. Use strong passwords and a screensaver.
• 3. Update and patch your operating system.
• 4. Have an up-to-date firewall.
• 5. Have up-to-date anti-virus software.
• 6. Act anti-spam.
• 7. Use up-to-date anti-spyware/adware tools.
• 8. Be sensible – don’t take unnecessary risks.
• 9. Back it up.
• 10. Fix problems as soon as they arise.
Safe Password
 Always use at least 8 character password with combination of
alphabets, numbers and special characters (*, %, @, #, $, ^)
 Use passwords that can be easily remembered by you
 Change password regularly as per policy
 Use password that is significantly different from earlier passwords
Use passwords which reveals your personal
information or words found in dictionary
Write down or Store passwords
Share passwords over phone or Email
Use passwords which do not match above complexity
criteria
Enterprise Security Evaluation
• Five Questions:
– What assets are you trying to protect?
– What are the risks to these assets?
– How well does the security solution mitigate those risks?
– What other risks does the security solution cause?
– What costs and trade-offs does the security solution impose?
• These Questions doesn’t bring solution but
evaluates a particular one
• InfoSec is up-to-date sense of understanding of Risks and
Assurance Controls.
• Balancing between Protection from Risks and Controls is
guarantee of business continuity Availability of Information
• Policies are statements of management intentions and goals
• Value defines the importance of info and required protection
level
• Protection level determines procedures and policies
• Policies are approved by high level managers
• Senior Management support and approval is vital to success
• Successful system should have different level of Security to
urge flexibility
Concluding Remarks
Information Security
RECIPA-IMT

More Related Content

What's hot

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Information security
Information security Information security
Information security razendar79
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security ManagementJonathan Coleman
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKATHEESKUMAR S
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy Dguest34b014
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseDesmond Devendran
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a SciencePankaj Rane
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2MLG College of Learning, Inc
 
CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1Hamed Moghaddam
 

What's hot (20)

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Information security
Information security Information security
Information security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information security
Information securityInformation security
Information security
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
 
Lesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPSLesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPS
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
 
CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
 

Viewers also liked

Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 

Viewers also liked (8)

Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Information security management
Information security managementInformation security management
Information security management
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Similar to 17 info sec_ma_imt_27_2_2012

SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROLshinydey
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfssuserf98dd4
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
Information security
Information securityInformation security
Information securityPraveen Minz
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
ISO_27001___2005_OASIS
ISO_27001___2005_OASISISO_27001___2005_OASIS
ISO_27001___2005_OASISDermot Clarke
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptPawachMetharattanara
 
Chapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxChapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxJhaiJhai6
 
1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptxdiaa46
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewali raza
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 

Similar to 17 info sec_ma_imt_27_2_2012 (20)

SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Unit v
Unit vUnit v
Unit v
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
Information security
Information securityInformation security
Information security
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Mis
MisMis
Mis
 
ISO_27001___2005_OASIS
ISO_27001___2005_OASISISO_27001___2005_OASIS
ISO_27001___2005_OASIS
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.ppt
 
Chapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxChapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptx
 
1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptx
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
ISM-CS5750-01.pptx
ISM-CS5750-01.pptxISM-CS5750-01.pptx
ISM-CS5750-01.pptx
 
IS Unit II.pptx
IS Unit II.pptxIS Unit II.pptx
IS Unit II.pptx
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 

Recently uploaded

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

17 info sec_ma_imt_27_2_2012

  • 2. • Understanding of information security and Key concepts • Understanding role model for having robust Information Security Management System Implementation • Empowerment of Information Security Management System through implementing best practices for People, Process and Technology. • Few Guidelines to maintain Network and Personal Security Aims I N F O S E C
  • 3. The Growth of Internet Crime “Of the top five categories of offenses reported to law enforcement during 2009, non-delivered merchandise and/or payment ranked 19.9%; identity theft, 14.1%; credit card fraud, 10.4%; auction fraud, 10.3%; and computer fraud (destruction/damage/vandalism of property), 7.9%.”
  • 4. Information Security • What is it? - The process in which “Confidentiality”, “Integrity” & “Availability” of information ensured. • In other words: - protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. (United States Code, title 44)
  • 5. Main Concepts – Confidentiality Preventing unauthorized persons, or parties to get access to the information – Integrity Safeguarding the accuracy and completeness of information and processing methods – Availability Ensuring access for authorized persons/parties anytime it’s needed.
  • 6. Information classification • Act of tagging information with labels to make divide them to different groups. • When it’s related to information security, It should be first step! • It enables to treat information in sets with similar procedures for easier handling and better management.
  • 7. Information classification • It clarifies information usage with respect to access control and confidentiality protection. – First is the issue of who is qualified to determine this – Mostly context and content dependent – Normally can be changed by Time and Circumstances • Best example is military classical classification – Unclassified – Secret – Top secret • In data world both “data” and “persons” are categorized to manage access control
  • 8. Confidentiality • Confidentiality ensures that only those with the rights and privileges to access information are able to do so. • Having complete Confidentiality can be impossible to insure at times. • Examples: – research data, – medical and insurance records, – new product specifications – corporate investment strategies.
  • 9. Integrity • Information has integrity when it is whole, complete, and uncorrupted. • The integrity of information is threatened when the information is exposed to corruption, damage, destruction, or other disruption of its authentic state. • When information is modified in unexpected ways, the result is known as loss of integrity. • It defines authenticity and level of trust
  • 10. Availability • Timely, reliable access to data and information services for authorized users, and has three main factors; – Reliability: degree in which a system performs its purpose for the period of time intended under the operating conditions encountered – Accessibility: degree in which a system is usable by as many people as possible without modification and is characterized in terms of the ability of users to have physical access to the system. – Timeliness: is the responsiveness of a system or resource to a user request. In fact,
  • 11. Availability • Traditionally Info AV has mostly been measured by the amount of time an information resource is either processing or not (uptime and downtime) • Other secondary factors; – Redundancy and thorough system backups – Preventative and correctative maintenance
  • 12. Possible Threats High User Knowledge of IT Systems Theft, Sabotage, Misuse Virus Attacks Systems & Network Failure Lack Of Documentation Lapse in Physical Security Natural Calamities & Fire
  • 14. Planning of InfoSec • An Strategic view will be: – Analysis of the current situation; – Identification of business-strategy requirements; – Identification of legal and regulatory requirements; – Identification of requirements due to external trends; – Definition of the target situation; – Definition and prioritization of strategic initiatives; – Distribution of the draft strategy; – Agreement and publication of final strategy. InfoSec Policy is approved by Top Management
  • 15. History Early 1990 • DTI (UK) established a working group • Information Security Management Code of Practice produced as BSI-DISC publication 1995 • BS 7799 published as UK Standard 1999 • BS 7799 - 1:1999 second revision published 2000 • BS 7799 - 1 accepted by ISO as ISO - 17799 published • BS 7799-2:2002 published
  • 16. History • ISO 27001:2005 Information technology — Security techniques — Information security management systems — Requirements • ISO 27002:2005 Information technology — Security techniques — Code of practice for information security management
  • 17. Security Triangle again Information Security Policy Organisation of Information Security Asset Management Human Resource Security Physical Security Communication & Operations Management Access Control System Development & Maintenance Incident Management Business Continuity Planning Compliance Availability
  • 18. A Security System Components PEOPLE PROCESSES TECHNOLOGY
  • 19. Technologies • Prevention of physical access by unauthorized people • Data Network Security by using proper access control • Communication line Security – Preventing eavesdroppers – Avoid tapping to line – Stopping intruders attacks
  • 20. Technologies • Proper Hardware design is main Solution: – Firewalls; Prevents unauthorized access from outside network – VPN; Provides Secure channels for transferring sensitive information – Antivirus; Ensures security of stored data by stopping worms, viruses, malwares, Trojans
  • 21. Processes • The processes refer to "work practices" or workflow. Processes are the repeatable steps to accomplish business objectives. • Generally this part which managed by software in data networks and administrative paperwork in physical environment, works under supervision of set of rules called “Policies” • As mentioned before Policy makers are made by strategic planners and approved by top management. • Asset management is main process of any InfoSec Solution
  • 22. Human Factor • People are biggest assets • But also they are biggest threat – More than 70% of Threats are Internal – More than 2/3rd express their inability to determine “Whether my systems are currently compromised?” – Psychological manipulation “Social Engineering” • Human awareness is most important issue • Also handled under asset management part
  • 23. THE 10 RULES OF THE SOHO INTERNET • 1. Safeguard your computer. • 2. Use strong passwords and a screensaver. • 3. Update and patch your operating system. • 4. Have an up-to-date firewall. • 5. Have up-to-date anti-virus software. • 6. Act anti-spam. • 7. Use up-to-date anti-spyware/adware tools. • 8. Be sensible – don’t take unnecessary risks. • 9. Back it up. • 10. Fix problems as soon as they arise.
  • 24. Safe Password  Always use at least 8 character password with combination of alphabets, numbers and special characters (*, %, @, #, $, ^)  Use passwords that can be easily remembered by you  Change password regularly as per policy  Use password that is significantly different from earlier passwords Use passwords which reveals your personal information or words found in dictionary Write down or Store passwords Share passwords over phone or Email Use passwords which do not match above complexity criteria
  • 25. Enterprise Security Evaluation • Five Questions: – What assets are you trying to protect? – What are the risks to these assets? – How well does the security solution mitigate those risks? – What other risks does the security solution cause? – What costs and trade-offs does the security solution impose? • These Questions doesn’t bring solution but evaluates a particular one
  • 26. • InfoSec is up-to-date sense of understanding of Risks and Assurance Controls. • Balancing between Protection from Risks and Controls is guarantee of business continuity Availability of Information • Policies are statements of management intentions and goals • Value defines the importance of info and required protection level • Protection level determines procedures and policies • Policies are approved by high level managers • Senior Management support and approval is vital to success • Successful system should have different level of Security to urge flexibility Concluding Remarks