SlideShare ist ein Scribd-Unternehmen logo
1 von 7
It Security
Attacks Viruses, Worms, Trojans Spam, Adware, Malware, Phishing Hacking is the intentional use of a computer resource without authorization or in excess of authorization. Denial-of-service (DoS) attacks overload victim servers so that they cannot serve users.
Attackers Traditional hackers were curiosity driven. Today’s hackers are criminals that dominate the attack world. On the horizon, cyberterror attacks by terrorist and cyberwar attacks by foreign governments could cause unprecedented levels of damage.
Security Management Security is primarily a management issue, not a technical issue. Risk Analysis – balancing cost and benefits of protection Comprehensive Security – Closing all avenues of attacks
Access Control Identify and list each asset Rate the sensitivity of each asset in terms of security risk Access Control Plan.  Also called Triple AAA.  Authentication, Authorization, and Auditing
Firewalls, IDSs, and IPSs Firewalls examine packets passing through the firewall. Intrusion Detection Systems (IDS) are designed to detect suspicious traffic. Intrusion Prevention Systems (IPS) are used to recognize complex attacks.  It helps prevent false positives.
Host Hardening and Vulnerability Testing Servers can be hardened by having vulnerabilities patched Vulnerability Test should be conducted by attacking the network (with permission) , in order to identify security weaknesses. http://www.youtube.com/watch?v=MJNJjh4jORY

Weitere ähnliche Inhalte

Was ist angesagt?

Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Web application security
Web application securityWeb application security
Web application securityKapil Sharma
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 

Was ist angesagt? (20)

Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Computer security and
Computer security andComputer security and
Computer security and
 
Social engineering
Social engineering Social engineering
Social engineering
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Web application security
Web application securityWeb application security
Web application security
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Network security
Network securityNetwork security
Network security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Computer security
Computer securityComputer security
Computer security
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
System Security
System SecuritySystem Security
System Security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Ähnlich wie IT Security Presentation

Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Securityxsy
 
vanmathy cryptography network security
vanmathy cryptography network securityvanmathy cryptography network security
vanmathy cryptography network securityPriyadharshiniVS
 
vanmathy cryptography network security
vanmathy cryptography network security vanmathy cryptography network security
vanmathy cryptography network security PriyadharshiniVS
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Cyber security
Cyber securityCyber security
Cyber securityAkdu095
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID SystemGayathridevi120
 
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill Educat
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill EducatChapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill Educat
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill EducatEstelaJeffery653
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptxlochanrajdahal
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetijctet
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...cyberprosocial
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...researchinventy
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 

Ähnlich wie IT Security Presentation (20)

Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
vanmathy cryptography network security
vanmathy cryptography network securityvanmathy cryptography network security
vanmathy cryptography network security
 
vanmathy cryptography network security
vanmathy cryptography network security vanmathy cryptography network security
vanmathy cryptography network security
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
 
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill Educat
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill EducatChapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill Educat
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill Educat
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Data security
Data securityData security
Data security
 

IT Security Presentation

  • 2. Attacks Viruses, Worms, Trojans Spam, Adware, Malware, Phishing Hacking is the intentional use of a computer resource without authorization or in excess of authorization. Denial-of-service (DoS) attacks overload victim servers so that they cannot serve users.
  • 3. Attackers Traditional hackers were curiosity driven. Today’s hackers are criminals that dominate the attack world. On the horizon, cyberterror attacks by terrorist and cyberwar attacks by foreign governments could cause unprecedented levels of damage.
  • 4. Security Management Security is primarily a management issue, not a technical issue. Risk Analysis – balancing cost and benefits of protection Comprehensive Security – Closing all avenues of attacks
  • 5. Access Control Identify and list each asset Rate the sensitivity of each asset in terms of security risk Access Control Plan. Also called Triple AAA. Authentication, Authorization, and Auditing
  • 6. Firewalls, IDSs, and IPSs Firewalls examine packets passing through the firewall. Intrusion Detection Systems (IDS) are designed to detect suspicious traffic. Intrusion Prevention Systems (IPS) are used to recognize complex attacks. It helps prevent false positives.
  • 7. Host Hardening and Vulnerability Testing Servers can be hardened by having vulnerabilities patched Vulnerability Test should be conducted by attacking the network (with permission) , in order to identify security weaknesses. http://www.youtube.com/watch?v=MJNJjh4jORY