SlideShare a Scribd company logo
1 of 16
Information Technology
L.P.Bansod
 We’ll try to outlining how we can work more securely on the Internet and help
protect our company’s information (including customer data) and financial
assets against online fraud and other cyber crimes.
 You’ve heard the tales of how companies and organizations were damaged and
in some cases even destroyed by cyber criminals. Here are a few true stories:
• A thief stole a company laptop, and the company lost a decade of irreplaceable research
and intellectual property worth millions.
• A newly-hired executive received email from what looked like his company’s travel agency,
where he was asked to click a link to confirm the accuracy of his personal details. This took
him to an official-looking site where he found his personal data. There, he was asked to
download software that would link his Outlook email account to the travel agency’s booking
system. In so doing, he downloaded malicious software that spread through his new
company.
• Hackers broke into the computers of a retail chain through an unsecured wireless network
and stole the financial information of all its customers, which cost the company millions in
lost business and was ruinous to its reputation.
 Most often, damage to big corporations dominates the news, but cyber crooks
target small and midsized businesses, too
It’s a Jungle out there
 Computer Viruses
 Trojan Horses
 Address Book Theft
 DNS Poisoning
 Zombies, IP Spoofing
 Password Grabber
 Network worms
 Logic Bombs
 Hijacked Home page
Most Popular
• Hoaxes
• Pop-ups
• Scams
• Spam
• Phishing
Did you know?
News: In 2004 a computer virus infected 1 million computers within and hour.
Computer Virus, network worms, Trojan Horse… these are
computer programs which tells computer what to do and how to
do it.
Silent Features :
Computer Virus - Needs a Host File, Copies Itself, Executable
Network Worm- No host (self contained), Copies Itself,
Executable
Trojan horse - No host (self contained), Does not copy itself,
Importer Program
Typical Symptoms: File deletion, File Corruption, Visual Effect, Pop-ups,
Erratic / unwanted behaviour, Computer crashes.
The most common source of
threat are
 Human error and mistakes
 Malicious human activity
 Natural Event and disaster
Note to Read
Top 5 Information Security
Concerns for the Corporation
or Business
 Awareness
 Information Security Management
 Weaknesses during Implementation
 ‘it cannot happen to me’ syndrome
 Underestimation of Technology
What can be done to Prevent
 Make Security awareness a corporate priority and
educate your staff.
 Enable real time protection, Implement Firewall
 Designate security support staff
 Update all vendor Security patches
 Subscribe to several security bulletins
 Periodic reboot and reload all computers
 Control, limit or block all download and installs
 Install Antivirus software on computer, keep it current
 Backup you data regularly.
 Create Strong Password and keep them private
Hoax, Trojan Horse
Hoax
 If the message tells you to do something,
tells you to take immediate action.
 Cites a recognizable source to give itself
credibility e.g “Microsoft has warned…”
 If in doubt, check it out on authoritative
hoax site
 securityresponse.symantec.com/avcenter/hoax.html
 svil.mcafeesecurity.com/vil/hoaxes.asp
Trojan horse
Downloading a File, Installing a program,
opening an attachment, opening bogus
website, copy file from someone else.
It exploits computers ports letting its friends
enter.
Security patches often close computer ports
and vulnerabilities.
Scams
 the steps we’ve covered so far are about protecting our company
information—customer data, intellectual property, and the like—
as well as vital financial assets.
 But scams abound. For example, an employee, asked to confirm
her password in an email message sent by someone posing as
her system administrator, gave criminals access to the company
network, bringing business to a halt.
 Or a payroll processing firm was hit by a phishing attack that sent
email to its businesses customers, asking them to reveal
passwords to continue to use their company’s payroll services
 Avoid putting confidential information in email unless it’s encrypted.
(Encryption enhances data security by scrambling the contents so that it
can be read only by someone who has the right key to unscramble it.)
Also, avoid putting sensitive information in instant or text messages, as
these are not typically secure. This includes account numbers,
passwords, intellectual property, customer data, and so on.
 Beware of scams—the most dangerous are the ones that appear to be
legitimate.
 Small and midsized businesses are as much a target of scams as
individuals. Scams directed to them can include links that advertise false
products, hoaxes that claim you’ve received a refund from the IRS or a
package from the post office that your company never ordered, charges
for unauthorized advertising or office supplies, or urgent requests to
update account information.
 All scams are designed to collect information the scammer can use to
steal company data or money—or both
 It’s a good idea to treat all public wireless connections as a
security risk because they’re often unsecured. This means that
Wi-Fi hot spots at coffee shops, hotels and motels, airports,
libraries, and other public places may be open to anyone who
wants to look at the traffic passing through them, using
inexpensive and readily available devices.
 Sometimes, businesses don’t have a firewall between their point
of sale computers—the cash registers that take your credit card
for payment—and the free wireless access they offer customers.
This can enable criminals to steal your credit card number when
you buy something.
 Or watch out for mock Wi-Fi hotspots, which often top the list of
available connections, enticing you with names like “Free Wi-Fi.”
Clicking one may expose your device to a hacker who could take
control of it.
 So look at some ways to connect to the web more safely when
you’re on the go
References
Authoritative Security Alert Information
 securityresponse.symantec.com/ (Symantec)
 www.microsoft.com/security
 www.apple.com/support/security/
Authoritative Free Public Anti-Virus Removal Tool
Information
 http://www.symantec.com/security_response/re
movaltools.jsp
 http://www.mcafee.com/us/threat-
center/technology/global-threat-intelligence-
technology.aspx
IT Act 2008 – Govt of India
 The IT Act 2008 extensively amends the Information Technology Act 2000:
 The increasing popularity of smartphones is addressed, and the term
‘communication devices’ is defined to mean ‘cell phones, personal digital
assistance or combination of both or any other device used to communicate,
send or transmit any text, video or image’.
 The validation of electronic signatures and contracts is addressed, and
‘electronic signature’ is substituted for ‘digital signature’ throughout the Act,
promoting technological neutrality. The term ‘electronic signature’ is defined
to mean ‘authentication of any electronic record by a subscriber by means of
[a specified] electronic technique… and includes digital signature’.
 Section 43A mandates that corporations are responsible for implementing
and maintaining ‘reasonable security practices and procedures’ to protect
‘sensitive personal data or information’. They are now liable for breaches and
must pay compensation to affected parties.
 Owners of a given IP address are now responsible for content accessed or
distributed through it.
 New forms of crime not covered by the original Act are addressed and new
penal provisions are included. Details of these offences are listed below.
 The majority of offences under the IT Act 2008 are punishable by up to three
years’ imprisonment and a fine of up to one lakh rupees
International Standards
ISO/IEC 27001:2013
 is the international standard that sets out the
specifications of an information security management
system (ISMS), a systematic approach to information
security that encompasses people, process, and
technology. An ISMS compliant with ISO 27001 can help
organisations meet all their information security
regulatory compliance objectives, as well as helping
them to prepare and position themselves for new and
emerging regulations.
Thank You.

More Related Content

What's hot

Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedVidaB
 
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - KloudlearnKloudLearn
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protectiontumetr1
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.pptshaks9151
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crimevishalgohel12195
 
Name parul
Name parulName parul
Name parulParul231
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 

What's hot (20)

Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Phishing
PhishingPhishing
Phishing
 
Computer crime
Computer crimeComputer crime
Computer crime
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - Kloudlearn
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
 
Cybe Crime & Its Type
Cybe Crime & Its TypeCybe Crime & Its Type
Cybe Crime & Its Type
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Name parul
Name parulName parul
Name parul
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 

Viewers also liked

Eksploatacija ugljikovodika u Jadranskom moru
Eksploatacija ugljikovodika u Jadranskom moruEksploatacija ugljikovodika u Jadranskom moru
Eksploatacija ugljikovodika u Jadranskom moruFinancijski klub
 
Godišnje izvješće o radu 2014./15.
Godišnje izvješće o radu 2014./15.Godišnje izvješće o radu 2014./15.
Godišnje izvješće o radu 2014./15.Financijski klub
 
UTT2016: Svečana završnica
UTT2016: Svečana završnicaUTT2016: Svečana završnica
UTT2016: Svečana završnicaFinancijski klub
 
ACI Hrvatska: Equity Trading
ACI Hrvatska: Equity TradingACI Hrvatska: Equity Trading
ACI Hrvatska: Equity TradingFinancijski klub
 
NRCan_Wireless_Power_Test_Procedure_Investigation_Final
NRCan_Wireless_Power_Test_Procedure_Investigation_FinalNRCan_Wireless_Power_Test_Procedure_Investigation_Final
NRCan_Wireless_Power_Test_Procedure_Investigation_FinalDavid Thomsen
 
2014-2015 RLS Update
2014-2015 RLS Update2014-2015 RLS Update
2014-2015 RLS UpdateDavid Thomsen
 
PG_E_Dryer_Comment_Letter_EERE-2014-BT-TP-0034 (1)
PG_E_Dryer_Comment_Letter_EERE-2014-BT-TP-0034 (1)PG_E_Dryer_Comment_Letter_EERE-2014-BT-TP-0034 (1)
PG_E_Dryer_Comment_Letter_EERE-2014-BT-TP-0034 (1)David Thomsen
 
Završnica University Trading Tournamenta 2015
Završnica University Trading Tournamenta 2015Završnica University Trading Tournamenta 2015
Završnica University Trading Tournamenta 2015Financijski klub
 
Lighting_retrofitting_Master_thesis
Lighting_retrofitting_Master_thesisLighting_retrofitting_Master_thesis
Lighting_retrofitting_Master_thesisMarta Gavioli
 
E-mobilnost - Konferencija o električnim autima
E-mobilnost - Konferencija o električnim autimaE-mobilnost - Konferencija o električnim autima
E-mobilnost - Konferencija o električnim autimaFinancijski klub
 
Skupine Financijskog kluba u 2014/2015
Skupine Financijskog kluba u 2014/2015Skupine Financijskog kluba u 2014/2015
Skupine Financijskog kluba u 2014/2015Financijski klub
 
Bacteriophage
BacteriophageBacteriophage
Bacteriophageniranjay
 

Viewers also liked (15)

Eksploatacija ugljikovodika u Jadranskom moru
Eksploatacija ugljikovodika u Jadranskom moruEksploatacija ugljikovodika u Jadranskom moru
Eksploatacija ugljikovodika u Jadranskom moru
 
Godišnje izvješće o radu 2014./15.
Godišnje izvješće o radu 2014./15.Godišnje izvješće o radu 2014./15.
Godišnje izvješće o radu 2014./15.
 
UTT2016: Svečana završnica
UTT2016: Svečana završnicaUTT2016: Svečana završnica
UTT2016: Svečana završnica
 
ACI Hrvatska: Equity Trading
ACI Hrvatska: Equity TradingACI Hrvatska: Equity Trading
ACI Hrvatska: Equity Trading
 
UTT: Indeksi
UTT: IndeksiUTT: Indeksi
UTT: Indeksi
 
NRCan_Wireless_Power_Test_Procedure_Investigation_Final
NRCan_Wireless_Power_Test_Procedure_Investigation_FinalNRCan_Wireless_Power_Test_Procedure_Investigation_Final
NRCan_Wireless_Power_Test_Procedure_Investigation_Final
 
UTT: Makroanaliza
UTT: MakroanalizaUTT: Makroanaliza
UTT: Makroanaliza
 
2014-2015 RLS Update
2014-2015 RLS Update2014-2015 RLS Update
2014-2015 RLS Update
 
PG_E_Dryer_Comment_Letter_EERE-2014-BT-TP-0034 (1)
PG_E_Dryer_Comment_Letter_EERE-2014-BT-TP-0034 (1)PG_E_Dryer_Comment_Letter_EERE-2014-BT-TP-0034 (1)
PG_E_Dryer_Comment_Letter_EERE-2014-BT-TP-0034 (1)
 
Završnica University Trading Tournamenta 2015
Završnica University Trading Tournamenta 2015Završnica University Trading Tournamenta 2015
Završnica University Trading Tournamenta 2015
 
Lighting_retrofitting_Master_thesis
Lighting_retrofitting_Master_thesisLighting_retrofitting_Master_thesis
Lighting_retrofitting_Master_thesis
 
E-mobilnost - Konferencija o električnim autima
E-mobilnost - Konferencija o električnim autimaE-mobilnost - Konferencija o električnim autima
E-mobilnost - Konferencija o električnim autima
 
Skupine Financijskog kluba u 2014/2015
Skupine Financijskog kluba u 2014/2015Skupine Financijskog kluba u 2014/2015
Skupine Financijskog kluba u 2014/2015
 
Bacteriophage
BacteriophageBacteriophage
Bacteriophage
 
FK Profitability Score
FK Profitability ScoreFK Profitability Score
FK Profitability Score
 

Similar to Information security

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesBryTech INC
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Cyber security best practices power point presentation
Cyber security best practices power point presentationCyber security best practices power point presentation
Cyber security best practices power point presentationAbcdEfg576575
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organimallisonshavon
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 

Similar to Information security (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Data security
 Data security  Data security
Data security
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling Enterprises
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber security best practices power point presentation
Cyber security best practices power point presentationCyber security best practices power point presentation
Cyber security best practices power point presentation
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organi
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 

Recently uploaded

Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Balliameghakumariji156
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...meghakumariji156
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...kumargunjan9515
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiMonica Sydney
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理F
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 

Recently uploaded (20)

Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 

Information security

  • 2.  We’ll try to outlining how we can work more securely on the Internet and help protect our company’s information (including customer data) and financial assets against online fraud and other cyber crimes.  You’ve heard the tales of how companies and organizations were damaged and in some cases even destroyed by cyber criminals. Here are a few true stories: • A thief stole a company laptop, and the company lost a decade of irreplaceable research and intellectual property worth millions. • A newly-hired executive received email from what looked like his company’s travel agency, where he was asked to click a link to confirm the accuracy of his personal details. This took him to an official-looking site where he found his personal data. There, he was asked to download software that would link his Outlook email account to the travel agency’s booking system. In so doing, he downloaded malicious software that spread through his new company. • Hackers broke into the computers of a retail chain through an unsecured wireless network and stole the financial information of all its customers, which cost the company millions in lost business and was ruinous to its reputation.  Most often, damage to big corporations dominates the news, but cyber crooks target small and midsized businesses, too
  • 3. It’s a Jungle out there  Computer Viruses  Trojan Horses  Address Book Theft  DNS Poisoning  Zombies, IP Spoofing  Password Grabber  Network worms  Logic Bombs  Hijacked Home page Most Popular • Hoaxes • Pop-ups • Scams • Spam • Phishing
  • 4. Did you know? News: In 2004 a computer virus infected 1 million computers within and hour. Computer Virus, network worms, Trojan Horse… these are computer programs which tells computer what to do and how to do it. Silent Features : Computer Virus - Needs a Host File, Copies Itself, Executable Network Worm- No host (self contained), Copies Itself, Executable Trojan horse - No host (self contained), Does not copy itself, Importer Program Typical Symptoms: File deletion, File Corruption, Visual Effect, Pop-ups, Erratic / unwanted behaviour, Computer crashes.
  • 5. The most common source of threat are  Human error and mistakes  Malicious human activity  Natural Event and disaster Note to Read
  • 6. Top 5 Information Security Concerns for the Corporation or Business  Awareness  Information Security Management  Weaknesses during Implementation  ‘it cannot happen to me’ syndrome  Underestimation of Technology
  • 7. What can be done to Prevent  Make Security awareness a corporate priority and educate your staff.  Enable real time protection, Implement Firewall  Designate security support staff  Update all vendor Security patches  Subscribe to several security bulletins  Periodic reboot and reload all computers  Control, limit or block all download and installs  Install Antivirus software on computer, keep it current  Backup you data regularly.  Create Strong Password and keep them private
  • 8. Hoax, Trojan Horse Hoax  If the message tells you to do something, tells you to take immediate action.  Cites a recognizable source to give itself credibility e.g “Microsoft has warned…”  If in doubt, check it out on authoritative hoax site  securityresponse.symantec.com/avcenter/hoax.html  svil.mcafeesecurity.com/vil/hoaxes.asp
  • 9. Trojan horse Downloading a File, Installing a program, opening an attachment, opening bogus website, copy file from someone else. It exploits computers ports letting its friends enter. Security patches often close computer ports and vulnerabilities.
  • 10. Scams  the steps we’ve covered so far are about protecting our company information—customer data, intellectual property, and the like— as well as vital financial assets.  But scams abound. For example, an employee, asked to confirm her password in an email message sent by someone posing as her system administrator, gave criminals access to the company network, bringing business to a halt.  Or a payroll processing firm was hit by a phishing attack that sent email to its businesses customers, asking them to reveal passwords to continue to use their company’s payroll services
  • 11.  Avoid putting confidential information in email unless it’s encrypted. (Encryption enhances data security by scrambling the contents so that it can be read only by someone who has the right key to unscramble it.) Also, avoid putting sensitive information in instant or text messages, as these are not typically secure. This includes account numbers, passwords, intellectual property, customer data, and so on.  Beware of scams—the most dangerous are the ones that appear to be legitimate.  Small and midsized businesses are as much a target of scams as individuals. Scams directed to them can include links that advertise false products, hoaxes that claim you’ve received a refund from the IRS or a package from the post office that your company never ordered, charges for unauthorized advertising or office supplies, or urgent requests to update account information.  All scams are designed to collect information the scammer can use to steal company data or money—or both
  • 12.  It’s a good idea to treat all public wireless connections as a security risk because they’re often unsecured. This means that Wi-Fi hot spots at coffee shops, hotels and motels, airports, libraries, and other public places may be open to anyone who wants to look at the traffic passing through them, using inexpensive and readily available devices.  Sometimes, businesses don’t have a firewall between their point of sale computers—the cash registers that take your credit card for payment—and the free wireless access they offer customers. This can enable criminals to steal your credit card number when you buy something.  Or watch out for mock Wi-Fi hotspots, which often top the list of available connections, enticing you with names like “Free Wi-Fi.” Clicking one may expose your device to a hacker who could take control of it.  So look at some ways to connect to the web more safely when you’re on the go
  • 13. References Authoritative Security Alert Information  securityresponse.symantec.com/ (Symantec)  www.microsoft.com/security  www.apple.com/support/security/ Authoritative Free Public Anti-Virus Removal Tool Information  http://www.symantec.com/security_response/re movaltools.jsp  http://www.mcafee.com/us/threat- center/technology/global-threat-intelligence- technology.aspx
  • 14. IT Act 2008 – Govt of India  The IT Act 2008 extensively amends the Information Technology Act 2000:  The increasing popularity of smartphones is addressed, and the term ‘communication devices’ is defined to mean ‘cell phones, personal digital assistance or combination of both or any other device used to communicate, send or transmit any text, video or image’.  The validation of electronic signatures and contracts is addressed, and ‘electronic signature’ is substituted for ‘digital signature’ throughout the Act, promoting technological neutrality. The term ‘electronic signature’ is defined to mean ‘authentication of any electronic record by a subscriber by means of [a specified] electronic technique… and includes digital signature’.  Section 43A mandates that corporations are responsible for implementing and maintaining ‘reasonable security practices and procedures’ to protect ‘sensitive personal data or information’. They are now liable for breaches and must pay compensation to affected parties.  Owners of a given IP address are now responsible for content accessed or distributed through it.  New forms of crime not covered by the original Act are addressed and new penal provisions are included. Details of these offences are listed below.  The majority of offences under the IT Act 2008 are punishable by up to three years’ imprisonment and a fine of up to one lakh rupees
  • 15. International Standards ISO/IEC 27001:2013  is the international standard that sets out the specifications of an information security management system (ISMS), a systematic approach to information security that encompasses people, process, and technology. An ISMS compliant with ISO 27001 can help organisations meet all their information security regulatory compliance objectives, as well as helping them to prepare and position themselves for new and emerging regulations.