SlideShare a Scribd company logo
1 of 39
IT SECURITY AWARENESS 
CAS - SUR
 Hardware (Physical Assets) 
 Software 
 System interfaces (e.g., internal and external 
connectivity) 
 Data and information 
 Persons who support and use the IT system 
 System mission (e.g., the processes performed 
by the IT system) 
 System and data criticality (e.g., the system’s 
value or importance to an organization) 
 System and data sensitivity 
NIST SP 800-30
Information is an asset which, 
like other important business 
assets, has value to an 
organization and consequently 
needs to be suitably protected 
 ISO/IEC17799: 2000
 Business Requirements 
 Client / customer / stakeholder 
 Marketing 
 Trustworthy 
 Internal management tool 
 Legal Requirements 
 Revenue Department 
 Stock Exchange of Thailand 
 Copyright, patents, ….
 Information security protects information from 
wide range of threats in order to 
 Ensure Business Continuity 
 Minimize Business Damage 
 Maximize ROI and Business Opportunities 
 Business : Stable service to customer 
 Education : Availability of resources and integrity of 
information e.g. grade, profile, etc. 
 ISO/IEC17799: 2000 page iii, Introduction
 Security is preservation of confidentiality, integrity 
and availability of information 
 Confidentiality 
 Ensuring that information is accessible only to those 
authorized to have access 
 Integrity 
 Safeguarding the accuracy and completeness of information 
and processing methods 
 Availability 
 Ensuring that authorized users have access to information 
and associated assets when required 
 BS7799-2: 2002 page3, 3.1, 3.2, 3.3
 Policy/Process/Pocedure 
 Clear 
 Coverage 
 Compliance – Legal, Standard, guideline etc. 
 People 
 Awareness (e.g. Password on screen) 
 Discipline 
 Technology 
 Enablers 
 Management Tools
 Could be anything that harm your system 
e.g. 
 User 
 Hacker/ cracker 
 Virus 
 Spam 
 Etc.
 Non-Computerized system 
 Masquerade 
 Social Engineering 
 Theft 
 System malfunction (disaster, power 
interruption) 
 IT Network Threat 
 Network Level 
 Application Level
 Denial of Services 
 Services has been disable by excessive workload. 
 Information sniffing 
 Information has been tapped and viewed by 
unauthorized person 
 Unauthorized access 
 Low level worker can access to critical information.
 Snooping 
m-y-p-a-s-s-w-o-r-d 
Telnet 203.152.145.121 
username:daeng 
password: 
203.152.145.121 
202.104.10.5
 3-way handshake 
SYN REQ 
SYN ACK 
ACK 
DATA TRANSFER 
WWW 
3-way handshake
 SYN attack 
203.152.145.121 
Internet WWW 
Attacker 
SYN REQ D=203.152.145.121 S=202.104.10.5 
202.104.10.5 
SYN ACK D=202.104.10.5 S=203.152.145.121 
WAIT 
1 
2
 Smurf Attack 
192.168.1.0 
ICMP REPLY D=203.152.149.1 S=192.168.1.1 
ICMP REPLY D=203.152.149.1 S=192.168.1.2 
ICMP REPLY D=203.152.149.1 S=192.168.1.3 
ICMP REPLY D=203.152.149.1 S=192.168.1.4 
ICMP REPLY D=203.152.149.1 S=192.168.1.5 
ICMP REPLY D=203.152.149.1 S=192.168.1.6 
ICMP REPLY D=203.152.149.1 S=192.168.1.7 
ICMP REPLY D=203.152.149.1 S=192.168.1.8 
203.152.149.1 
ICMP REQ D=192.168.1.255 S=203.152.149.2 
Internet
 Virus vs Worms..? 
 Virus 
 Viruses are computer programs that are designed to spread 
themselves from one file to another on a single computer. 
 A virus might rapidly infect every application file on an 
individual computer, or slowly infect the documents on that 
computer, 
 but it does not intentionally try to spread itself from that 
computer to other computers. 
 Worms 
 Worms, on the other hand, are insidious 
 because they rely less (or not at all) upon human behavior in 
order to spread themselves from one computer to others. 
 The computer worm is a program that is designed to copy itself 
from one computer to another over a network (e.g. by using 
e-mail).
 E-mail spoofing 
 Pretend to be someone e.g. 
bill_gate@microsoft.com, 
 Spam Mail 
 Unsolicited or unwanted e-mail or Phising
 Desktop Threat 
 Viruses, worms, Trojan, Backdoor 
 Cookies 
 Java Script and Java Applet 
 Zombies network 
 Key logger (Game-Online)
 We need “control” which are 
 Policy & Process security control to provide 
guideline and framework 
 People to control user behavior 
 Technology will be a tool in order to enforced 
Policy throughout the organization effectively.
 Policy Compliance 
 ISO 17799 
 Compliance Checking 
 CobiT Audit Tools 
 NIST security standard guideline 
 NIST – 800 series 
 Organization Control 
 Business Continuity Plan
 Security Awareness Training 
 Security Learning Continuum 
 Awareness, Training, Education 
 Responsibility Control 
 Need to know basis
 Computer Security is the process of preventing 
and detecting unauthorized use of your 
computer 
 Prevention measures help you to stop 
unauthorized users (intruders) from accessing 
any part of you computer network 
 Detection helps you to determine whether or 
not someone attempted to break into your 
system, if they were successful, and what they 
may have done. 
 Network and Host Based Security 
 Security Devices (Hardware) or Security Software
 Firewall (Access control) 
 IDS/IPS 
 VPN & SSL VPN (Data Encryption) 
 Anti-Spam (preventing un-wanted email) 
 QoS (Quality of Services - Bandwidth 
Management) 
Web Content Filtering 
 IM & P2P
Web Traffic— 
customers, partners, employees 
Email Traffic 
Applications/Web Services Traffic 
partners, customers, internal 
VPN Traffic 
remote and mobile users 
Internal security threat 
Contractors/disgruntled employees 
Remote user
 Type of firewall 
 Packet filtering 
 Application Firewall 
 Stateful Inspection 
 Type of implementation 
 Packet Filter 
 Screened host 
 Dual home Host 
 Screen Subnet (DMZ) 
References: CISSP Certification 
Packet Filter 
Screened Host 
Dual home Host 
Screened Subnet
Known 
Attacks 
DOS/DDOS 
Zero-day 
Attacks 
Laptop Desktop Server Core Edge Branch Office 
Host IPS Network IPS
 Detection & Prevention System 
 Signature & Behavior & Anomaly based
 Encryption & Decryption 
 Public Key & Private Key 
 Encryption Technology 
 DES 
 3DES 
 AES
Source: Symantec/ 
Brightmail
 Why do they spam? 
 0.0005$ vs 1.21$ -> 0.02B vs 48.4B 
 1/100,000 count as success 
 How much does spam is? <spamcorp.net> 
 ~6 e-mail/sec 360 e-mail/min 21,600 e-mail/hr 
 How do they get my e-mail? 
 Webboard, forum, etc. 
 Does spam legal? 
 How to Protect yourself from getting spam?
 Cracks and Hacks Tools Website 
 Spyware, Trojan, Virus, etc. 
 Banner & Advertising 
 Adware, Toolbar, Spam – Subscribe, Credit card 
no., etc. 
 Drugs, Gambling, Weapon, etc. 
 Pornography, Nude, Adult Materials 
 Shopping Online (Credit card issues)
 Anti – Virus 
 VPN - Client 
 Personal Firewall 
 IDS 
Web-Filtering 
 Small group, Home used, Computer Laboratory, 
etc.
 IM 
 Virus 
 Exploit 
 Voice Chat 
 P2P 
 Bandwidth Usage 
 Spyware 
 BackDoor
Questions

More Related Content

What's hot

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryrryrsyd
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abusePrakash Raval
 
Cyber security & network attack6
Cyber security & network attack6Cyber security & network attack6
Cyber security & network attack6HCL Technologies
 
Client server network threat
Client server network threatClient server network threat
Client server network threatRaj vardhan
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security ManagementBhadra Gowdra
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 

What's hot (20)

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
System Security
System SecuritySystem Security
System Security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Cyber security & network attack6
Cyber security & network attack6Cyber security & network attack6
Cyber security & network attack6
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
System security
System securitySystem security
System security
 

Viewers also liked

Using COBIT PO9 to perform Project Risk Analysis
Using COBIT PO9 to perform Project Risk AnalysisUsing COBIT PO9 to perform Project Risk Analysis
Using COBIT PO9 to perform Project Risk Analysiswebmentorman
 
Intro To COBIT IT Controls And Cost Benefit Analysis
Intro To COBIT IT Controls And Cost Benefit AnalysisIntro To COBIT IT Controls And Cost Benefit Analysis
Intro To COBIT IT Controls And Cost Benefit Analysiswebmentorman
 
Using many languages in single Android App (in tamil)
Using many languages in single Android App (in tamil)Using many languages in single Android App (in tamil)
Using many languages in single Android App (in tamil)Dr. Ramkumar Lakshminarayanan
 

Viewers also liked (18)

Using COBIT PO9 to perform Project Risk Analysis
Using COBIT PO9 to perform Project Risk AnalysisUsing COBIT PO9 to perform Project Risk Analysis
Using COBIT PO9 to perform Project Risk Analysis
 
Intro To COBIT IT Controls And Cost Benefit Analysis
Intro To COBIT IT Controls And Cost Benefit AnalysisIntro To COBIT IT Controls And Cost Benefit Analysis
Intro To COBIT IT Controls And Cost Benefit Analysis
 
Using many languages in single Android App (in tamil)
Using many languages in single Android App (in tamil)Using many languages in single Android App (in tamil)
Using many languages in single Android App (in tamil)
 
SQLite in Android App (in tamil)
SQLite in Android App (in tamil)SQLite in Android App (in tamil)
SQLite in Android App (in tamil)
 
Part 7
Part 7Part 7
Part 7
 
Android Application using seekbar (in tamil)
Android Application using seekbar (in tamil)Android Application using seekbar (in tamil)
Android Application using seekbar (in tamil)
 
Shared Preference in Android App
Shared Preference in Android AppShared Preference in Android App
Shared Preference in Android App
 
Create Android App using web view (in tamil)
Create Android App using web view (in tamil)Create Android App using web view (in tamil)
Create Android App using web view (in tamil)
 
Hardware Interface in Android (in tamil)
Hardware Interface in Android (in tamil)Hardware Interface in Android (in tamil)
Hardware Interface in Android (in tamil)
 
Phonegap for Android
Phonegap for AndroidPhonegap for Android
Phonegap for Android
 
GPS in Android (in tamil)
GPS in Android (in tamil)GPS in Android (in tamil)
GPS in Android (in tamil)
 
Creating Image Gallery - Android app (in tamil)
Creating Image Gallery - Android app (in tamil)Creating Image Gallery - Android app (in tamil)
Creating Image Gallery - Android app (in tamil)
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
Data Storage in Android App
Data Storage in Android AppData Storage in Android App
Data Storage in Android App
 
Create and Sell Android App (in tamil)
Create and Sell Android App (in tamil)Create and Sell Android App (in tamil)
Create and Sell Android App (in tamil)
 
Rating Bar in Android Example
Rating Bar in Android ExampleRating Bar in Android Example
Rating Bar in Android Example
 
Creating Sample Android App (in tamil)
Creating Sample Android App (in tamil)Creating Sample Android App (in tamil)
Creating Sample Android App (in tamil)
 
What is Cobit
What is CobitWhat is Cobit
What is Cobit
 

Similar to Basics of IT security

Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security STS
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Network Security
Network SecurityNetwork Security
Network Securityforpalmigho
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersSomyos U.
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
 

Similar to Basics of IT security (20)

information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Data security
Data securityData security
Data security
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Network Security
Network SecurityNetwork Security
Network Security
 
Task 3
Task 3Task 3
Task 3
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
S T M U T M
S T M  U T MS T M  U T M
S T M U T M
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 

More from Dr. Ramkumar Lakshminarayanan (15)

IT Security Awareness Posters
IT Security Awareness PostersIT Security Awareness Posters
IT Security Awareness Posters
 
Normalisation revision
Normalisation revisionNormalisation revision
Normalisation revision
 
Windows mobile programming
Windows mobile programmingWindows mobile programming
Windows mobile programming
 
Concurrency control
Concurrency controlConcurrency control
Concurrency control
 
Web technology today
Web technology todayWeb technology today
Web technology today
 
Php Tutorial
Php TutorialPhp Tutorial
Php Tutorial
 
Android app - Creating Live Wallpaper (tamil)
Android app - Creating Live Wallpaper (tamil)Android app - Creating Live Wallpaper (tamil)
Android app - Creating Live Wallpaper (tamil)
 
Android Tips (Tamil)
Android Tips (Tamil)Android Tips (Tamil)
Android Tips (Tamil)
 
Android Animation (in tamil)
Android Animation (in tamil)Android Animation (in tamil)
Android Animation (in tamil)
 
Creating List in Android App (in tamil)
Creating List in Android App (in tamil)Creating List in Android App (in tamil)
Creating List in Android App (in tamil)
 
Single Touch event view in Android (in tamil)
Single Touch event view in Android (in tamil)Single Touch event view in Android (in tamil)
Single Touch event view in Android (in tamil)
 
Notification in Android App (in tamil)
Notification in Android App (in tamil)Notification in Android App (in tamil)
Notification in Android App (in tamil)
 
Layout Object in Android App
Layout Object in Android AppLayout Object in Android App
Layout Object in Android App
 
Sample Add Application uisng Android (in tamil)
Sample Add Application uisng Android (in tamil)Sample Add Application uisng Android (in tamil)
Sample Add Application uisng Android (in tamil)
 
Installing Eclipse (in tamil)
Installing Eclipse (in tamil)Installing Eclipse (in tamil)
Installing Eclipse (in tamil)
 

Recently uploaded

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Basics of IT security

  • 2.  Hardware (Physical Assets)  Software  System interfaces (e.g., internal and external connectivity)  Data and information  Persons who support and use the IT system  System mission (e.g., the processes performed by the IT system)  System and data criticality (e.g., the system’s value or importance to an organization)  System and data sensitivity NIST SP 800-30
  • 3. Information is an asset which, like other important business assets, has value to an organization and consequently needs to be suitably protected  ISO/IEC17799: 2000
  • 4.  Business Requirements  Client / customer / stakeholder  Marketing  Trustworthy  Internal management tool  Legal Requirements  Revenue Department  Stock Exchange of Thailand  Copyright, patents, ….
  • 5.  Information security protects information from wide range of threats in order to  Ensure Business Continuity  Minimize Business Damage  Maximize ROI and Business Opportunities  Business : Stable service to customer  Education : Availability of resources and integrity of information e.g. grade, profile, etc.  ISO/IEC17799: 2000 page iii, Introduction
  • 6.  Security is preservation of confidentiality, integrity and availability of information  Confidentiality  Ensuring that information is accessible only to those authorized to have access  Integrity  Safeguarding the accuracy and completeness of information and processing methods  Availability  Ensuring that authorized users have access to information and associated assets when required  BS7799-2: 2002 page3, 3.1, 3.2, 3.3
  • 7.  Policy/Process/Pocedure  Clear  Coverage  Compliance – Legal, Standard, guideline etc.  People  Awareness (e.g. Password on screen)  Discipline  Technology  Enablers  Management Tools
  • 8.  Could be anything that harm your system e.g.  User  Hacker/ cracker  Virus  Spam  Etc.
  • 9.  Non-Computerized system  Masquerade  Social Engineering  Theft  System malfunction (disaster, power interruption)  IT Network Threat  Network Level  Application Level
  • 10.  Denial of Services  Services has been disable by excessive workload.  Information sniffing  Information has been tapped and viewed by unauthorized person  Unauthorized access  Low level worker can access to critical information.
  • 11.  Snooping m-y-p-a-s-s-w-o-r-d Telnet 203.152.145.121 username:daeng password: 203.152.145.121 202.104.10.5
  • 12.  3-way handshake SYN REQ SYN ACK ACK DATA TRANSFER WWW 3-way handshake
  • 13.  SYN attack 203.152.145.121 Internet WWW Attacker SYN REQ D=203.152.145.121 S=202.104.10.5 202.104.10.5 SYN ACK D=202.104.10.5 S=203.152.145.121 WAIT 1 2
  • 14.  Smurf Attack 192.168.1.0 ICMP REPLY D=203.152.149.1 S=192.168.1.1 ICMP REPLY D=203.152.149.1 S=192.168.1.2 ICMP REPLY D=203.152.149.1 S=192.168.1.3 ICMP REPLY D=203.152.149.1 S=192.168.1.4 ICMP REPLY D=203.152.149.1 S=192.168.1.5 ICMP REPLY D=203.152.149.1 S=192.168.1.6 ICMP REPLY D=203.152.149.1 S=192.168.1.7 ICMP REPLY D=203.152.149.1 S=192.168.1.8 203.152.149.1 ICMP REQ D=192.168.1.255 S=203.152.149.2 Internet
  • 15.  Virus vs Worms..?  Virus  Viruses are computer programs that are designed to spread themselves from one file to another on a single computer.  A virus might rapidly infect every application file on an individual computer, or slowly infect the documents on that computer,  but it does not intentionally try to spread itself from that computer to other computers.  Worms  Worms, on the other hand, are insidious  because they rely less (or not at all) upon human behavior in order to spread themselves from one computer to others.  The computer worm is a program that is designed to copy itself from one computer to another over a network (e.g. by using e-mail).
  • 16.  E-mail spoofing  Pretend to be someone e.g. bill_gate@microsoft.com,  Spam Mail  Unsolicited or unwanted e-mail or Phising
  • 17.  Desktop Threat  Viruses, worms, Trojan, Backdoor  Cookies  Java Script and Java Applet  Zombies network  Key logger (Game-Online)
  • 18.  We need “control” which are  Policy & Process security control to provide guideline and framework  People to control user behavior  Technology will be a tool in order to enforced Policy throughout the organization effectively.
  • 19.  Policy Compliance  ISO 17799  Compliance Checking  CobiT Audit Tools  NIST security standard guideline  NIST – 800 series  Organization Control  Business Continuity Plan
  • 20.  Security Awareness Training  Security Learning Continuum  Awareness, Training, Education  Responsibility Control  Need to know basis
  • 21.  Computer Security is the process of preventing and detecting unauthorized use of your computer  Prevention measures help you to stop unauthorized users (intruders) from accessing any part of you computer network  Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done.  Network and Host Based Security  Security Devices (Hardware) or Security Software
  • 22.  Firewall (Access control)  IDS/IPS  VPN & SSL VPN (Data Encryption)  Anti-Spam (preventing un-wanted email)  QoS (Quality of Services - Bandwidth Management) Web Content Filtering  IM & P2P
  • 23. Web Traffic— customers, partners, employees Email Traffic Applications/Web Services Traffic partners, customers, internal VPN Traffic remote and mobile users Internal security threat Contractors/disgruntled employees Remote user
  • 24.  Type of firewall  Packet filtering  Application Firewall  Stateful Inspection  Type of implementation  Packet Filter  Screened host  Dual home Host  Screen Subnet (DMZ) References: CISSP Certification Packet Filter Screened Host Dual home Host Screened Subnet
  • 25.
  • 26. Known Attacks DOS/DDOS Zero-day Attacks Laptop Desktop Server Core Edge Branch Office Host IPS Network IPS
  • 27.  Detection & Prevention System  Signature & Behavior & Anomaly based
  • 28.  Encryption & Decryption  Public Key & Private Key  Encryption Technology  DES  3DES  AES
  • 30.  Why do they spam?  0.0005$ vs 1.21$ -> 0.02B vs 48.4B  1/100,000 count as success  How much does spam is? <spamcorp.net>  ~6 e-mail/sec 360 e-mail/min 21,600 e-mail/hr  How do they get my e-mail?  Webboard, forum, etc.  Does spam legal?  How to Protect yourself from getting spam?
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.  Cracks and Hacks Tools Website  Spyware, Trojan, Virus, etc.  Banner & Advertising  Adware, Toolbar, Spam – Subscribe, Credit card no., etc.  Drugs, Gambling, Weapon, etc.  Pornography, Nude, Adult Materials  Shopping Online (Credit card issues)
  • 36.  Anti – Virus  VPN - Client  Personal Firewall  IDS Web-Filtering  Small group, Home used, Computer Laboratory, etc.
  • 37.
  • 38.  IM  Virus  Exploit  Voice Chat  P2P  Bandwidth Usage  Spyware  BackDoor