2. What is security management?
Goals of security management.
Tools for security management.
Encryption.
Firewall.
E-mail Monitoring.
Biometric
Disaster Recovery.
3. set of functions that protects telecommunications
networks
systems from unauthorized access by
persons, acts, or influences
such as creating, deleting, and
controlling security services
controlling the distribution of cryptographic
keying material; and authorizing subscriber
access, rights, and privileges.
4. The protection of information assets from
unauthorized disclosure, modification or destruction
by either accidental or intentional means.
5. Accuracy, integrity and safety of information
system activities and resources.
Controls can minimize errors, fraud and
destruction in the internet worked information
systems that interconnect today’s end users
and organizations.
Quality assurance for information systems.
7. “In cryptography, encryption is the
process of transforming information
(referred to as plaintext) using an
algorithm (called a cipher) to make it
unreadable to anyone except those
possessing special knowledge, usually
referred to as a key.”
8.
9. Keep confidential information safe Prevent
exposure of information while in transit across
an unsecure medium
Prevent exposure of information when a
storage device is lost or stolen
Oregon Identity Theft Protection Act (Senate
Bill 583) “safe harbor”
10. Device to protect networks
Software & hardware format
Based upon a set of rules
11.
12. Employee use of electronic mail (e-mail) during
business hours is a common characteristic of
the 21st century workplace.
According to a recent study, over 130 million
workers are currently flooding recipients with
2.8 billion e-mail messages each day.
Employers provide e-mail services to their
employees as an efficient means of facilitating
both intra-company communication and
communication with the outside client base.
14. Biometric it is high technology security system
which relies on detailed measurements of the
human body.
Biometric control devices use special purpose
sensors to measure and digitize biometric
profile of an individuals fingerprints, voice of
other physical trait.
15. Such as :-
Fingerprint
Facial recognition
Hand geometry
Iris scan
Retina scan
DNA
Speech recognition
Signature recognition
16. There are different threats are include such
as
hurricanes, earthquake, tsunami, lightning, fire
s, floods, criminal and terrorist acts and human
error can an severely damage an organization’s
computing resources.
Therefore, organizations develop disaster
recovery procedures and formalize them in
disaster recovery plan.
17. Identify your resources.
Identify your risk.
Recovery Strategies.