SlideShare une entreprise Scribd logo
1  sur  4
Security – Layers of Control
Layers of control
                                                   Personnel screening

 Invasions of privacy,                            Operational security
                                                                                                Natural disasters
   virus introduction,
                                                                                                 and accidents
 malicious destruction                          Communications security
         of data
                                                Authorisation software

                                                 Terminal use controls

                                                   Building security

                                                     IT SYSTEMS
                                                         AND
                                                         DATA
      Errors in                                                                           Espionage, fraud
   programming,                               Guards, Ids, Visitors passes,               and theft, threats,
  input and output                                    sign in/out                             blackmail
    procedures,
     operations                     Locks, swipe cards, biometric measures (e.g.
                                              fingerprint recognition)
                                  Access rights (e.g. no access, read-only, read-write)

                                Automatic callback, encryption, hand-shaking procedures

                   Audit trails, unusual patterns of use, virus checks, backup and recovery procedures

              Hiring policies, separation of duties, education and training, establishing standards of honesty
Layers of control
• Building and equipment security
  ▫ locks and window grills, guards, alarms and automatic fire
    extinguishers, Id cards, visitor’s pass
• Authorisation software
  ▫ user ids and passwords
• Communications security
  ▫ Databases vulnerable to outside hackers. Combat illegal
    access with call back, handshaking, encryption
• Operational security
  ▫ Audit controls track what happens on a network
• Audit trail
  ▫ record that traces a transaction
• Personnel safeguards
  ▫ users and computer personnel within an organisation are
    more likely to breach security than outsiders
Corporate I.T. security policy
• Awareness and education
  ▫ Training
• Administrative controls
  ▫ screening, separation of duties
• Operations controls
  ▫ backups, access controls
• Physical protection of data
  ▫ controlled access, fire/flood alarms, UPS
• Access controls to the system and information
  ▫ access levels, access rights, encryption
• Disaster recovery plan

Contenu connexe

Tendances

Information system and security control
Information system and security controlInformation system and security control
Information system and security controlCheng Olayvar
 
Class4 Security
Class4 SecurityClass4 Security
Class4 SecurityRMS
 
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Source Conference
 
E commerce- securing the business on internet
E commerce- securing the business on internetE commerce- securing the business on internet
E commerce- securing the business on internetSandhi Shivanya
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data ProtectionCreatorsCircle
 
Visitor Management System for educational institutions
Visitor Management System for educational institutionsVisitor Management System for educational institutions
Visitor Management System for educational institutionsAthulJojo1
 
truMe for establishments
truMe for establishmentstruMe for establishments
truMe for establishmentsAthulJojo1
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaNew Horizons Bulgaria
 
Intrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityIntrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityPLN9 Security Services Pvt. Ltd.
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Data Security
Data SecurityData Security
Data SecurityAkNirojan
 

Tendances (18)

Prov fact sheet
Prov fact sheetProv fact sheet
Prov fact sheet
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 
Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
 
Class4 Security
Class4 SecurityClass4 Security
Class4 Security
 
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
 
E commerce- securing the business on internet
E commerce- securing the business on internetE commerce- securing the business on internet
E commerce- securing the business on internet
 
Security Audit
Security AuditSecurity Audit
Security Audit
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Visitor Management System for educational institutions
Visitor Management System for educational institutionsVisitor Management System for educational institutions
Visitor Management System for educational institutions
 
truMe for establishments
truMe for establishmentstruMe for establishments
truMe for establishments
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
HIPAA Preso
HIPAA PresoHIPAA Preso
HIPAA Preso
 
Intrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityIntrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For Security
 
8. operations security
8. operations security8. operations security
8. operations security
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Data Security
Data SecurityData Security
Data Security
 

Similaire à Layers of control

Security management and tools
Security management and toolsSecurity management and tools
Security management and toolsVibhor Raut
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By DesignNalneesh Gaur
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, GiuxIBMSSA
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterpriseAbha Damani
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security SuiteCharles McNeil
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...Andris Soroka
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber securityPsychoCryGaming
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...Ahmed Al Enizi
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Information Security
Information SecurityInformation Security
Information Securitysteffiann88
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze DataExchangeAgency
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 

Similaire à Layers of control (20)

Security management and tools
Security management and toolsSecurity management and tools
Security management and tools
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Infrastructure Services Market 2009
Infrastructure Services  Market 2009Infrastructure Services  Market 2009
Infrastructure Services Market 2009
 
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
 
Isys20261 lecture 03
Isys20261 lecture 03Isys20261 lecture 03
Isys20261 lecture 03
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterprise
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security Suite
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber security
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Information Security
Information SecurityInformation Security
Information Security
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 

Plus de Rebecca Jones

P2 functions and equations from a graph questions
P2  functions and equations from a graph questionsP2  functions and equations from a graph questions
P2 functions and equations from a graph questionsRebecca Jones
 
04 access howtobuttons
04 access howtobuttons04 access howtobuttons
04 access howtobuttonsRebecca Jones
 
03 access howtofrmmaster
03 access howtofrmmaster03 access howtofrmmaster
03 access howtofrmmasterRebecca Jones
 
02 access howtobasicforms
02 access howtobasicforms02 access howtobasicforms
02 access howtobasicformsRebecca Jones
 
01 access howtointroduction
01 access howtointroduction01 access howtointroduction
01 access howtointroductionRebecca Jones
 
Fractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quizFractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quizRebecca Jones
 
03 analysis of_requirementsspecification
03 analysis of_requirementsspecification03 analysis of_requirementsspecification
03 analysis of_requirementsspecificationRebecca Jones
 
Software development lifecycle
Software development lifecycleSoftware development lifecycle
Software development lifecycleRebecca Jones
 
Btec unit 1 the online world learning aim b
Btec unit 1  the online world learning aim bBtec unit 1  the online world learning aim b
Btec unit 1 the online world learning aim bRebecca Jones
 
Intro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_logIntro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_logRebecca Jones
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014Rebecca Jones
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014Rebecca Jones
 
08 e commerce entities
08 e commerce entities08 e commerce entities
08 e commerce entitiesRebecca Jones
 
08 benefits of e-commerce
08 benefits of e-commerce08 benefits of e-commerce
08 benefits of e-commerceRebecca Jones
 
18 database features
18 database features18 database features
18 database featuresRebecca Jones
 
Employee management-security-controls
Employee management-security-controlsEmployee management-security-controls
Employee management-security-controlsRebecca Jones
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryptionRebecca Jones
 

Plus de Rebecca Jones (20)

P2 functions and equations from a graph questions
P2  functions and equations from a graph questionsP2  functions and equations from a graph questions
P2 functions and equations from a graph questions
 
04 access howtobuttons
04 access howtobuttons04 access howtobuttons
04 access howtobuttons
 
03 access howtofrmmaster
03 access howtofrmmaster03 access howtofrmmaster
03 access howtofrmmaster
 
02 access howtobasicforms
02 access howtobasicforms02 access howtobasicforms
02 access howtobasicforms
 
01 access howtointroduction
01 access howtointroduction01 access howtointroduction
01 access howtointroduction
 
Fractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quizFractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quiz
 
03 analysis of_requirementsspecification
03 analysis of_requirementsspecification03 analysis of_requirementsspecification
03 analysis of_requirementsspecification
 
Software development lifecycle
Software development lifecycleSoftware development lifecycle
Software development lifecycle
 
Btec unit 1 the online world learning aim b
Btec unit 1  the online world learning aim bBtec unit 1  the online world learning aim b
Btec unit 1 the online world learning aim b
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
Intro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_logIntro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_log
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014
 
08 e commerce entities
08 e commerce entities08 e commerce entities
08 e commerce entities
 
08 benefits of e-commerce
08 benefits of e-commerce08 benefits of e-commerce
08 benefits of e-commerce
 
18 database features
18 database features18 database features
18 database features
 
1.4 adaptations
1.4 adaptations1.4 adaptations
1.4 adaptations
 
Codesof practice
Codesof practiceCodesof practice
Codesof practice
 
Employee management-security-controls
Employee management-security-controlsEmployee management-security-controls
Employee management-security-controls
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryption
 

Layers of control

  • 1. Security – Layers of Control
  • 2. Layers of control Personnel screening Invasions of privacy, Operational security Natural disasters virus introduction, and accidents malicious destruction Communications security of data Authorisation software Terminal use controls Building security IT SYSTEMS AND DATA Errors in Espionage, fraud programming, Guards, Ids, Visitors passes, and theft, threats, input and output sign in/out blackmail procedures, operations Locks, swipe cards, biometric measures (e.g. fingerprint recognition) Access rights (e.g. no access, read-only, read-write) Automatic callback, encryption, hand-shaking procedures Audit trails, unusual patterns of use, virus checks, backup and recovery procedures Hiring policies, separation of duties, education and training, establishing standards of honesty
  • 3. Layers of control • Building and equipment security ▫ locks and window grills, guards, alarms and automatic fire extinguishers, Id cards, visitor’s pass • Authorisation software ▫ user ids and passwords • Communications security ▫ Databases vulnerable to outside hackers. Combat illegal access with call back, handshaking, encryption • Operational security ▫ Audit controls track what happens on a network • Audit trail ▫ record that traces a transaction • Personnel safeguards ▫ users and computer personnel within an organisation are more likely to breach security than outsiders
  • 4. Corporate I.T. security policy • Awareness and education ▫ Training • Administrative controls ▫ screening, separation of duties • Operations controls ▫ backups, access controls • Physical protection of data ▫ controlled access, fire/flood alarms, UPS • Access controls to the system and information ▫ access levels, access rights, encryption • Disaster recovery plan