SlideShare a Scribd company logo
1 of 35
Objectives of this project


 To understand various
  threats to data security.
 To know the background
  of these threats.
 To know about the
  various techniques to
  defense these threats.
Introduction

 Data is the raw form of information, which
  stored in our databases, network
  servers, personal computers and some other
  places. But all data or information is not
  accessible for all. Some data or information is
  personal, as well as implicit for its own purpose.
  In that case some people or organizations can
  try to capture those ‘not accessible information’.
  So “Data Security” has come into focus.
What is Data


According to Webster’s Third New International
Dictionary, Data is “something given or
admitted; facts or principles granted or
presented; that upon which an inference or
argument is based, or from which an ideal
system of any sort is constructed”.
Classification of data


 Public Data ----- Open to all users and no
  security measures are necessary
 Limited-Access Data ----- Only authorized users
  have access to this type of data
 Private Data ----- This data is open to a single
  user only, the owner of that particular data
Physical Storage of Data


 Mechanical (Paper, punched
  card, film, gramophone record, etc.)
 Magnetic Storage (Magnetic tape, floppy disk)
 Optical Storage (Photographic
  paper, microform, optical disc)
 Electrical (Semiconductor used in volatile RAM
  chips, etc.)
What is Security


 Security is the protection of
  information, systems and services against
  disasters, mistakes and exploitation, so that
  the probability of incidents is minimized.
What is Data Security


 Data security is the means of ensuring that data
  is kept safe from corruption and that access to it
  is suitably controlled. Thus data security helps to
  ensure privacy. It also helps in protecting
  personal data. That means protection of data
  from unauthorized (that may be accidental or
  intentional) access, modification and
  destruction.
Why Data Security

  Access Controls: Access controls regulate the
   reading, copying, changing and deletion of
   data and programs.
  Flow Controls: Flow controls can prevent a
   service program from leaking the customer’s
   confidential data.
  Inference Controls: A method of preventing
   data about specific individuals from being
   inferred from statistical information in a data
   base about groups of people.
Various threats to a computer
system
  Accidents and Natural Disasters: Natural
   disasters such as flood, wind or earthquake, and
   accidents such as fire, power failure, and
   breakdown of electrical systems create threats
   to the organizations computer
  High risk factor from Computer Abuse:
        High Vulnerability
        Violation of the principle of separation of duties
        Easy manipulation of large amount of data.
        Impersonal nature of systems
Various threats to a computer
system
  Human Initiated
       Hackers
       Unaware Staff
       Dissatisfied Staff
       Spy
Technology Available for Computer
Security

   Cryptography
   Biometric Systems
   Malicious Code and Anti Virus Solutions
   Firewall
   Intrusion Detection System (IDS)
   Virtual Private Network (VPN)
   PKI and Digital Certificates
   SSH Encryption
   SSL Encryption
Cryptography


 Cryptography is the “Practice of the enciphering
  and deciphering of messages in secret code in
  order to render them unintelligible to all but the
  intended receiver.” It is a high-level encryption
  technique that is being used to ensure privacy in
  the digital world. Encryption is “the mechanism
  of coding data transmitted by various
  telecommunication systems so that only
  authorized user may have access to it;”
Biometric Systems

 Biometrics is the application of any
  biological characteristics, such as
  pattern      formed       by    the
  fingers, retinas, irises, hands etc.
  used for user authentication.
 Various biometric technologies:
       (a) Fingerprint verification
       (b) Hand geometry
       (c) Retinal scanning
       (d) Signature verification
       (e) Voice verification
       (f) Facial recognition
Malicious Code and Anti Virus
Solutions
    The malicious code includes
        Computer viruses,
        Worms,
        Trojan horses,
        Back doors/trap doors,
        Logic bombs,
        Bacteria, etc.
Malicious Code and Anti Virus
Solutions (contd…)
    Computer Viruses: Computer program
    designed to copy itself into other
    programs, with the intention of causing
    mischief or damage.
      Different Types of Viruses:
        Boot Sector viruses
        File infectors
        Macro viruses
        Polymorphic viruses
Malicious Code and Anti Virus
Solutions (contd…)
    Spyware: Spyware is a type of malware that
     can be installed on computers, and which
     collects small pieces of information about
     users without their knowledge. The presence
     of spyware is typically hidden from the
     user, and can be difficult to detect.
     Typically, spyware is secretly installed on the
     user's personal computer.
Malicious Code and Anti Virus
Solutions (contd…)
    Worm: In a computer, a worm is a self
     replicating virus that does not alter files but
     resides in active memory and duplicates itself.
     Worms use parts of an operating system that are
     automatic and usually invisible to the user.
    Trojan Horse: Trojan horse is a program in which
     malicious or harmful code is contained inside
     apparently harmless programming or data in
     such a way that it can get control and do its
     chosen form of damage.
Malicious Code and Anti Virus
Solutions (contd…)
  Back Doors/Trap Doors: These are codes written
   into applications to grant special access to
   programs bypassing normal methods of
   authentication.
  Logic Bombs: Logic bombs are programmed that
   hidden in commonly used software for an extended
   period of time until they are activate. They come
   embedded with some programs.
  Bacteria/Rabbit: These codes do not damage files.
   Their purpose is to deny access to the resources by
   consuming all processor capability/memory/disk
   space by self-replicating.
Malicious Code and Anti Virus
Solutions (contd…)
    Creators of Virus Code: The malicious codes
     are written / created by dissatisfied
     employees, spies, experimenters, publicity
     hunter, political activists, etc.
    Damages Caused by Malicious Codes
        Loss of data services
        Leak of information
        Loss of reputation or legal penalty for software firm
Malicious Code and Anti Virus
Solutions (contd…)

Steps to protect the computer from viruses
 When installing new software, install it first on a non-critical system and
    test for bugs.
   Periodically review all system start-up and configuration files for changes.
   Turn off the automatic open on receipt feature from your e-mail software
   Before opening any attachments first scan it using updated anti-virus
    software.
   Regularly update anti-virus software engine and data files.
   Turn off visual basic scripting.
   When not in use turn off the workstation or disconnect it from the
    network.
   Take regular backup of critical data and system files.
Firewall

 Computer security system
 that controls the flow of data
 from one computer or
 network to another. Firewalls
 are mainly intended to
 protect the resources of a
 private network from being
 directly accessed by a user
 from        an        external
 network, especially via the
 Internet.
Why Firewall?

 Prevent outside access except some special
  service like E-mail or HTTP
 IP addresses of the site can be protected from
  outside world by blocking DNS service.
 All incoming and outgoing traffic from the
  Internet can be logged to provide statistics
  about the network usage.
Intrusion Detection System (IDS)


   A device or software application that
    monitors network and/or system activities for
    malicious activities or policy violations and
    produces reports to a Management Station.
       Types:
    1. Host Based Intrusion Detection Systems
    (HIDS)
    2. Network Based Intrusion Detection Systems
    (NIDS)
Virtual Private Network (VPN)




 A network that is constructed by using public wires to
  connect nodes. These systems use encryption and other
  security mechanisms to ensure that only authorized
  users can access the network and that the data cannot
  be intercepted.
PKI and Digital Certificates


 PKI (Public Key Infrastructure) is a process that
  enables users to implement public key
  cryptography. PKI offers various services related
  to authentication and access control, such as
  digital certificates to associate a user’s
  identity, certificate download, signing of
  certificate, confirm validity of
  certificate, terminate certificate, etc.
SSH Encryption


 Secure Shell (Developed by SSH
  Communications Security Ltd.), is a program to
  log into another computer over a network, to
  execute commands in a remote machine, and to
  move files from one machine to another.
SSL Encryption


 Secure Sockets Layer (Also known as TLS or
  Transport Layer Security) is a protocol
  developed by Netscape for transmitting private
  documents via the Internet.
Other security processes


 E-Mail Security
 File system security
 Disk Mirroring
 Backup
 UPS
 Personnel Security
 Auditing
Some Security Tips
 Encourage or require employees to choose passwords that are not
  common.
 Require employees to change passwords every 90 days.
 Make sure your virus protection subscription is current and update.
 Educate employees about the security risks of e-mail attachments.
 Assess your security posture regularly.
 When an employee leaves a company, remove that employee’s
  network access immediately.
 If you allow people to work from home, provide a secure, centrally
  managed server for remote traffic.
 Update your Web server software regularly.
 Do not run any unnecessary network services.
Acts for Data Security

To protect data from various threats, a lot of act has
  been enacting. Some of these are
   The Privacy Act (1974), U.S.
   The Computer Fraud and Abuse Act (1986), U.S.
   The Computer Security Act (1987), U.S.
   The Digital Millennium Copyright
    Act (DMCA), 1998, U.S.
   Data Protection Act 1998, U.K.
   Swiss Federal Act on Data Protection (DPA), 1992
   The Information Technology Act 2000, India
Data Security action in India
 In India, some Cyber Crime Enforcement Agency
    has been set up
  Cyber Crime Police Station, Bangalore
  Cyber Crime Investigation Cell of Mumbai Police
  Cyber Crime Police Station of Andhra Pradesh
  The Crime Branch of Criminal Investigation
    Department, Tamilnadu police
  In East India, Cyber Crime Cells have been set up
    by the Kolkata Police as well as the Criminal
    Investigation Department, West Bengal
Data Security Council of India

 Data Security Council of India (DSCI), a section
  25 not-for-profit company, was setup as an
  independent Self Regulatory Organization (SRO)
  by NASSCOM, to promote data
  protection, develop security and privacy codes &
  standards and encourage the IT/BPO industry to
  implement the same.
Conclusion

 Due to hacking issue the popular British Tabloid
  “News of the World” has been banned. The
  Australian Internet activist Julian Assange has
  gone to the prison due to wikileaks. But hacking
  is not stopped. So, we must aware of data
  security. We have to adopt the latest technology
  for defending the various threats.
Thank You !

More Related Content

What's hot

cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 

What's hot (20)

Data security
Data securityData security
Data security
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Network security
Network securityNetwork security
Network security
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Data security
Data securityData security
Data security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Mobile security
Mobile securityMobile security
Mobile security
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Security threats
Security threatsSecurity threats
Security threats
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 

Viewers also liked

портфоліо викладача та студента
портфоліо викладача та студентапортфоліо викладача та студента
портфоліо викладача та студентаallamatvienko
 
Indian CA Firms: Gaining Momentum
Indian CA Firms: Gaining MomentumIndian CA Firms: Gaining Momentum
Indian CA Firms: Gaining MomentumNeha Sharma
 
元銀座No1ホステス:藤田 尚弓先生に、生放送で「話し方・伝え方」のことを質問しよう! 先生:藤田 尚弓
元銀座No1ホステス:藤田 尚弓先生に、生放送で「話し方・伝え方」のことを質問しよう! 先生:藤田 尚弓元銀座No1ホステス:藤田 尚弓先生に、生放送で「話し方・伝え方」のことを質問しよう! 先生:藤田 尚弓
元銀座No1ホステス:藤田 尚弓先生に、生放送で「話し方・伝え方」のことを質問しよう! 先生:藤田 尚弓schoowebcampus
 
ラッパー・環ROY先生に、生放送で「創作活動(クリエイション)」「音楽・ヒップホップ」のことを質問しよう! 先生:環ROY
ラッパー・環ROY先生に、生放送で「創作活動(クリエイション)」「音楽・ヒップホップ」のことを質問しよう! 先生:環ROYラッパー・環ROY先生に、生放送で「創作活動(クリエイション)」「音楽・ヒップホップ」のことを質問しよう! 先生:環ROY
ラッパー・環ROY先生に、生放送で「創作活動(クリエイション)」「音楽・ヒップホップ」のことを質問しよう! 先生:環ROYschoowebcampus
 
スマホだけでアプリが作れる!「Androidでプログラミング」特別講座
スマホだけでアプリが作れる!「Androidでプログラミング」特別講座スマホだけでアプリが作れる!「Androidでプログラミング」特別講座
スマホだけでアプリが作れる!「Androidでプログラミング」特別講座schoowebcampus
 
Materiales dentales ingles
Materiales dentales    inglesMateriales dentales    ingles
Materiales dentales inglesZulemaQuezz
 
Customer Care Line introduction
Customer Care Line introductionCustomer Care Line introduction
Customer Care Line introductionfamilymosaic
 
マンガで学ぶ「学校や英会話教室では教えられない英語表現」 (シーズン2 第3回:デートの感想編)
マンガで学ぶ「学校や英会話教室では教えられない英語表現」 (シーズン2 第3回:デートの感想編)マンガで学ぶ「学校や英会話教室では教えられない英語表現」 (シーズン2 第3回:デートの感想編)
マンガで学ぶ「学校や英会話教室では教えられない英語表現」 (シーズン2 第3回:デートの感想編)schoowebcampus
 
Presentasi Thesis Tahap 1
Presentasi Thesis Tahap 1Presentasi Thesis Tahap 1
Presentasi Thesis Tahap 1Olipe Green
 
NATION UNDER ANGUISH - ACRIMONIOUS ENVIRONMENT
NATION UNDER ANGUISH - ACRIMONIOUS ENVIRONMENT NATION UNDER ANGUISH - ACRIMONIOUS ENVIRONMENT
NATION UNDER ANGUISH - ACRIMONIOUS ENVIRONMENT Neha Sharma
 
Mẹo hay giữ eo cùng bellydance
Mẹo hay giữ eo cùng bellydanceMẹo hay giữ eo cùng bellydance
Mẹo hay giữ eo cùng bellydancebiquyetdangdep
 
ホームルーム第三回!―注目授業のご紹介・皆さんから意見などを募集 
ホームルーム第三回!―注目授業のご紹介・皆さんから意見などを募集 ホームルーム第三回!―注目授業のご紹介・皆さんから意見などを募集 
ホームルーム第三回!―注目授業のご紹介・皆さんから意見などを募集 schoowebcampus
 
Webデザインの基礎と実習_2
Webデザインの基礎と実習_2Webデザインの基礎と実習_2
Webデザインの基礎と実習_2schoowebcampus
 
Poolside Planning with PoolCorp - Hyperion Planning Implementation / Enterpri...
Poolside Planning with PoolCorp - Hyperion Planning Implementation / Enterpri...Poolside Planning with PoolCorp - Hyperion Planning Implementation / Enterpri...
Poolside Planning with PoolCorp - Hyperion Planning Implementation / Enterpri...Terry Ledet
 
Лекція № 1. Облаштування КІІКТ
Лекція № 1. Облаштування КІІКТЛекція № 1. Облаштування КІІКТ
Лекція № 1. Облаштування КІІКТIrina Grigoryan
 
2014年東京都知事選から、東京と日本の目指すべき姿を考える 先生:江口 晋太朗・藤村 龍至
2014年東京都知事選から、東京と日本の目指すべき姿を考える 先生:江口 晋太朗・藤村 龍至2014年東京都知事選から、東京と日本の目指すべき姿を考える 先生:江口 晋太朗・藤村 龍至
2014年東京都知事選から、東京と日本の目指すべき姿を考える 先生:江口 晋太朗・藤村 龍至schoowebcampus
 
Expectation from the new government
Expectation from the new governmentExpectation from the new government
Expectation from the new governmentNeha Sharma
 

Viewers also liked (20)

портфоліо викладача та студента
портфоліо викладача та студентапортфоліо викладача та студента
портфоліо викладача та студента
 
Indian CA Firms: Gaining Momentum
Indian CA Firms: Gaining MomentumIndian CA Firms: Gaining Momentum
Indian CA Firms: Gaining Momentum
 
Heldere test
Heldere testHeldere test
Heldere test
 
元銀座No1ホステス:藤田 尚弓先生に、生放送で「話し方・伝え方」のことを質問しよう! 先生:藤田 尚弓
元銀座No1ホステス:藤田 尚弓先生に、生放送で「話し方・伝え方」のことを質問しよう! 先生:藤田 尚弓元銀座No1ホステス:藤田 尚弓先生に、生放送で「話し方・伝え方」のことを質問しよう! 先生:藤田 尚弓
元銀座No1ホステス:藤田 尚弓先生に、生放送で「話し方・伝え方」のことを質問しよう! 先生:藤田 尚弓
 
ラッパー・環ROY先生に、生放送で「創作活動(クリエイション)」「音楽・ヒップホップ」のことを質問しよう! 先生:環ROY
ラッパー・環ROY先生に、生放送で「創作活動(クリエイション)」「音楽・ヒップホップ」のことを質問しよう! 先生:環ROYラッパー・環ROY先生に、生放送で「創作活動(クリエイション)」「音楽・ヒップホップ」のことを質問しよう! 先生:環ROY
ラッパー・環ROY先生に、生放送で「創作活動(クリエイション)」「音楽・ヒップホップ」のことを質問しよう! 先生:環ROY
 
スマホだけでアプリが作れる!「Androidでプログラミング」特別講座
スマホだけでアプリが作れる!「Androidでプログラミング」特別講座スマホだけでアプリが作れる!「Androidでプログラミング」特別講座
スマホだけでアプリが作れる!「Androidでプログラミング」特別講座
 
Materiales dentales ingles
Materiales dentales    inglesMateriales dentales    ingles
Materiales dentales ingles
 
Customer Care Line introduction
Customer Care Line introductionCustomer Care Line introduction
Customer Care Line introduction
 
マンガで学ぶ「学校や英会話教室では教えられない英語表現」 (シーズン2 第3回:デートの感想編)
マンガで学ぶ「学校や英会話教室では教えられない英語表現」 (シーズン2 第3回:デートの感想編)マンガで学ぶ「学校や英会話教室では教えられない英語表現」 (シーズン2 第3回:デートの感想編)
マンガで学ぶ「学校や英会話教室では教えられない英語表現」 (シーズン2 第3回:デートの感想編)
 
Presentasi Thesis Tahap 1
Presentasi Thesis Tahap 1Presentasi Thesis Tahap 1
Presentasi Thesis Tahap 1
 
Como aprendo a vivir
Como aprendo a vivirComo aprendo a vivir
Como aprendo a vivir
 
NATION UNDER ANGUISH - ACRIMONIOUS ENVIRONMENT
NATION UNDER ANGUISH - ACRIMONIOUS ENVIRONMENT NATION UNDER ANGUISH - ACRIMONIOUS ENVIRONMENT
NATION UNDER ANGUISH - ACRIMONIOUS ENVIRONMENT
 
Mẹo hay giữ eo cùng bellydance
Mẹo hay giữ eo cùng bellydanceMẹo hay giữ eo cùng bellydance
Mẹo hay giữ eo cùng bellydance
 
ホームルーム第三回!―注目授業のご紹介・皆さんから意見などを募集 
ホームルーム第三回!―注目授業のご紹介・皆さんから意見などを募集 ホームルーム第三回!―注目授業のご紹介・皆さんから意見などを募集 
ホームルーム第三回!―注目授業のご紹介・皆さんから意見などを募集 
 
Webデザインの基礎と実習_2
Webデザインの基礎と実習_2Webデザインの基礎と実習_2
Webデザインの基礎と実習_2
 
Poolside Planning with PoolCorp - Hyperion Planning Implementation / Enterpri...
Poolside Planning with PoolCorp - Hyperion Planning Implementation / Enterpri...Poolside Planning with PoolCorp - Hyperion Planning Implementation / Enterpri...
Poolside Planning with PoolCorp - Hyperion Planning Implementation / Enterpri...
 
Elan 2016
Elan 2016Elan 2016
Elan 2016
 
Лекція № 1. Облаштування КІІКТ
Лекція № 1. Облаштування КІІКТЛекція № 1. Облаштування КІІКТ
Лекція № 1. Облаштування КІІКТ
 
2014年東京都知事選から、東京と日本の目指すべき姿を考える 先生:江口 晋太朗・藤村 龍至
2014年東京都知事選から、東京と日本の目指すべき姿を考える 先生:江口 晋太朗・藤村 龍至2014年東京都知事選から、東京と日本の目指すべき姿を考える 先生:江口 晋太朗・藤村 龍至
2014年東京都知事選から、東京と日本の目指すべき姿を考える 先生:江口 晋太朗・藤村 龍至
 
Expectation from the new government
Expectation from the new governmentExpectation from the new government
Expectation from the new government
 

Similar to Data security

Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryrryrsyd
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Information security
Information securityInformation security
Information securityIshaRana14
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysisdadkhah077
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Jennifer Letterman
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Securityxsy
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 

Similar to Data security (20)

Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Computer security
Computer securityComputer security
Computer security
 
Information security
Information securityInformation security
Information security
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Computer security and
Computer security andComputer security and
Computer security and
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Communication security
Communication securityCommunication security
Communication security
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Data security

  • 1.
  • 2. Objectives of this project  To understand various threats to data security.  To know the background of these threats.  To know about the various techniques to defense these threats.
  • 3. Introduction  Data is the raw form of information, which stored in our databases, network servers, personal computers and some other places. But all data or information is not accessible for all. Some data or information is personal, as well as implicit for its own purpose. In that case some people or organizations can try to capture those ‘not accessible information’. So “Data Security” has come into focus.
  • 4. What is Data According to Webster’s Third New International Dictionary, Data is “something given or admitted; facts or principles granted or presented; that upon which an inference or argument is based, or from which an ideal system of any sort is constructed”.
  • 5. Classification of data  Public Data ----- Open to all users and no security measures are necessary  Limited-Access Data ----- Only authorized users have access to this type of data  Private Data ----- This data is open to a single user only, the owner of that particular data
  • 6. Physical Storage of Data  Mechanical (Paper, punched card, film, gramophone record, etc.)  Magnetic Storage (Magnetic tape, floppy disk)  Optical Storage (Photographic paper, microform, optical disc)  Electrical (Semiconductor used in volatile RAM chips, etc.)
  • 7. What is Security  Security is the protection of information, systems and services against disasters, mistakes and exploitation, so that the probability of incidents is minimized.
  • 8. What is Data Security  Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. That means protection of data from unauthorized (that may be accidental or intentional) access, modification and destruction.
  • 9. Why Data Security  Access Controls: Access controls regulate the reading, copying, changing and deletion of data and programs.  Flow Controls: Flow controls can prevent a service program from leaking the customer’s confidential data.  Inference Controls: A method of preventing data about specific individuals from being inferred from statistical information in a data base about groups of people.
  • 10. Various threats to a computer system  Accidents and Natural Disasters: Natural disasters such as flood, wind or earthquake, and accidents such as fire, power failure, and breakdown of electrical systems create threats to the organizations computer  High risk factor from Computer Abuse:  High Vulnerability  Violation of the principle of separation of duties  Easy manipulation of large amount of data.  Impersonal nature of systems
  • 11. Various threats to a computer system  Human Initiated  Hackers  Unaware Staff  Dissatisfied Staff  Spy
  • 12. Technology Available for Computer Security  Cryptography  Biometric Systems  Malicious Code and Anti Virus Solutions  Firewall  Intrusion Detection System (IDS)  Virtual Private Network (VPN)  PKI and Digital Certificates  SSH Encryption  SSL Encryption
  • 13. Cryptography  Cryptography is the “Practice of the enciphering and deciphering of messages in secret code in order to render them unintelligible to all but the intended receiver.” It is a high-level encryption technique that is being used to ensure privacy in the digital world. Encryption is “the mechanism of coding data transmitted by various telecommunication systems so that only authorized user may have access to it;”
  • 14. Biometric Systems  Biometrics is the application of any biological characteristics, such as pattern formed by the fingers, retinas, irises, hands etc. used for user authentication.  Various biometric technologies:  (a) Fingerprint verification  (b) Hand geometry  (c) Retinal scanning  (d) Signature verification  (e) Voice verification  (f) Facial recognition
  • 15. Malicious Code and Anti Virus Solutions  The malicious code includes  Computer viruses,  Worms,  Trojan horses,  Back doors/trap doors,  Logic bombs,  Bacteria, etc.
  • 16. Malicious Code and Anti Virus Solutions (contd…)  Computer Viruses: Computer program designed to copy itself into other programs, with the intention of causing mischief or damage.  Different Types of Viruses:  Boot Sector viruses  File infectors  Macro viruses  Polymorphic viruses
  • 17. Malicious Code and Anti Virus Solutions (contd…)  Spyware: Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer.
  • 18. Malicious Code and Anti Virus Solutions (contd…)  Worm: In a computer, a worm is a self replicating virus that does not alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user.  Trojan Horse: Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage.
  • 19. Malicious Code and Anti Virus Solutions (contd…)  Back Doors/Trap Doors: These are codes written into applications to grant special access to programs bypassing normal methods of authentication.  Logic Bombs: Logic bombs are programmed that hidden in commonly used software for an extended period of time until they are activate. They come embedded with some programs.  Bacteria/Rabbit: These codes do not damage files. Their purpose is to deny access to the resources by consuming all processor capability/memory/disk space by self-replicating.
  • 20. Malicious Code and Anti Virus Solutions (contd…)  Creators of Virus Code: The malicious codes are written / created by dissatisfied employees, spies, experimenters, publicity hunter, political activists, etc.  Damages Caused by Malicious Codes  Loss of data services  Leak of information  Loss of reputation or legal penalty for software firm
  • 21. Malicious Code and Anti Virus Solutions (contd…) Steps to protect the computer from viruses  When installing new software, install it first on a non-critical system and test for bugs.  Periodically review all system start-up and configuration files for changes.  Turn off the automatic open on receipt feature from your e-mail software  Before opening any attachments first scan it using updated anti-virus software.  Regularly update anti-virus software engine and data files.  Turn off visual basic scripting.  When not in use turn off the workstation or disconnect it from the network.  Take regular backup of critical data and system files.
  • 22. Firewall  Computer security system that controls the flow of data from one computer or network to another. Firewalls are mainly intended to protect the resources of a private network from being directly accessed by a user from an external network, especially via the Internet.
  • 23. Why Firewall?  Prevent outside access except some special service like E-mail or HTTP  IP addresses of the site can be protected from outside world by blocking DNS service.  All incoming and outgoing traffic from the Internet can be logged to provide statistics about the network usage.
  • 24. Intrusion Detection System (IDS)  A device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Types: 1. Host Based Intrusion Detection Systems (HIDS) 2. Network Based Intrusion Detection Systems (NIDS)
  • 25. Virtual Private Network (VPN)  A network that is constructed by using public wires to connect nodes. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
  • 26. PKI and Digital Certificates  PKI (Public Key Infrastructure) is a process that enables users to implement public key cryptography. PKI offers various services related to authentication and access control, such as digital certificates to associate a user’s identity, certificate download, signing of certificate, confirm validity of certificate, terminate certificate, etc.
  • 27. SSH Encryption  Secure Shell (Developed by SSH Communications Security Ltd.), is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another.
  • 28. SSL Encryption  Secure Sockets Layer (Also known as TLS or Transport Layer Security) is a protocol developed by Netscape for transmitting private documents via the Internet.
  • 29. Other security processes  E-Mail Security  File system security  Disk Mirroring  Backup  UPS  Personnel Security  Auditing
  • 30. Some Security Tips  Encourage or require employees to choose passwords that are not common.  Require employees to change passwords every 90 days.  Make sure your virus protection subscription is current and update.  Educate employees about the security risks of e-mail attachments.  Assess your security posture regularly.  When an employee leaves a company, remove that employee’s network access immediately.  If you allow people to work from home, provide a secure, centrally managed server for remote traffic.  Update your Web server software regularly.  Do not run any unnecessary network services.
  • 31. Acts for Data Security To protect data from various threats, a lot of act has been enacting. Some of these are  The Privacy Act (1974), U.S.  The Computer Fraud and Abuse Act (1986), U.S.  The Computer Security Act (1987), U.S.  The Digital Millennium Copyright Act (DMCA), 1998, U.S.  Data Protection Act 1998, U.K.  Swiss Federal Act on Data Protection (DPA), 1992  The Information Technology Act 2000, India
  • 32. Data Security action in India In India, some Cyber Crime Enforcement Agency has been set up  Cyber Crime Police Station, Bangalore  Cyber Crime Investigation Cell of Mumbai Police  Cyber Crime Police Station of Andhra Pradesh  The Crime Branch of Criminal Investigation Department, Tamilnadu police  In East India, Cyber Crime Cells have been set up by the Kolkata Police as well as the Criminal Investigation Department, West Bengal
  • 33. Data Security Council of India  Data Security Council of India (DSCI), a section 25 not-for-profit company, was setup as an independent Self Regulatory Organization (SRO) by NASSCOM, to promote data protection, develop security and privacy codes & standards and encourage the IT/BPO industry to implement the same.
  • 34. Conclusion  Due to hacking issue the popular British Tabloid “News of the World” has been banned. The Australian Internet activist Julian Assange has gone to the prison due to wikileaks. But hacking is not stopped. So, we must aware of data security. We have to adopt the latest technology for defending the various threats.