SlideShare ist ein Scribd-Unternehmen logo
1 von 65
Downloaden Sie, um offline zu lesen
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Information Security
Sukant Kole
Advanced Centre for Informatics & Innovative Learning
Indira Gandhi National Open University, New Delhi
August 24, 2010
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
What is Information Security ?
Definition
Information Security means protection of information and
information system from unauthorized access, modification and
misuse of information or destruction.
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
What is Information Security ?
Definition
Information Security means protection of information and
information system from unauthorized access, modification and
misuse of information or destruction.
Impact of Weather Forecasting & Flight Scheduling System
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Integrity
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Integrity
Confidentiality
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Integrity
Confidentiality
Availability
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Integrity
Confidentiality
Availability
Security
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Integrity
Confidentiality
Availability
Security
Privacy
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Cyber Espionage
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Access restriction to datacentre, Security surveillance,
Disaster Recovery
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Access restriction to datacentre, Security surveillance,
Disaster Recovery
VLAN, Authentication Authorization & Auditing service,
WPA-PSK
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Access restriction to datacentre, Security surveillance,
Disaster Recovery
VLAN, Authentication Authorization & Auditing service,
WPA-PSK
Security patches, Stable version, 3 tier architecture
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
What is encryption ?
Definition
“....In cryptography, encryption is the process of transforming
information (referred to as plaintext) using an algorithm (called
cipher) to make it unreadable to anyone except those possessing
special knowledge, usually referred to as a key. The result of the
process is encrypted information (in cryptography, referred to as
ciphertext....” (Source: Wikipedia)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Symmetric Encryption
(Ref: http://www.devx.com/dbzone/Article/29232/1954)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Asymmetric Encryption
(Ref: www.uic.edu/depts/accc/newsletter/adn26/figure2.html)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies (Password, Resource Access)
IT Policies
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies (Password, Resource Access)
IT Policies
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies (Password, Resource Access)
IT Policies (Backup, firewall, IDS & IPS)
General
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies (Password, Resource Access)
IT Policies (Backup, firewall, IDS & IPS)
General
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies (Password, Resource Access)
IT Policies (Backup, firewall, IDS & IPS)
General (Service License Agreement, Business Continuity)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Worm
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Worm
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Social Engineering attacks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Definition
“....In the field of networking, the specialist area of network
security consists of the provisions and policies adopted by the
network administrator to prevent and monitor unauthorized access,
misuse, modification, or denial of the computer network and
network-accessible resources....” (Source: Wikipedia)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,
Packet flooding)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,
Packet flooding)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,
Packet flooding)
Unauthorized access to resources (unsecured LAN /WLAN
network points)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,
Packet flooding)
Unauthorized access to resources (unsecured LAN /WLAN
network points)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,
Packet flooding)
Unauthorized access to resources (unsecured LAN /WLAN
network points)
MAC Spoofing, Man-in-the-middle attack
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Vulnerability Assessment tools (Nessus, Wireshark)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Vulnerability Assessment tools (Nessus, Wireshark)
Penetration Testing assessment
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
De-Militarized Zones
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
De-Militarized Zones
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
De-Militarized Zones
Virtual LANs
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
De-Militarized Zones
Virtual LANs
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
De-Militarized Zones
Virtual LANs
Authentication, Authorization, Auditing Service (Desktop,
Web)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Weitere ähnliche Inhalte

Was ist angesagt?

Use GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouUse GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouCameronTait3
 
Security threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerceSecurity threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerceDinesh Kumar Aggarwal
 
08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...IAESIJEECS
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Voice communication security
Voice communication securityVoice communication security
Voice communication securityFabio Pietrosanti
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Security B-Sides
 
1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt1 Info Sec+Risk Mgmt
1 Info Sec+Risk MgmtAlfred Ouyang
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...idsecconf
 
Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015Timothy Nolan
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1Irsandi Hasan
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)Wail Hassan
 

Was ist angesagt? (20)

Use GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouUse GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With You
 
Security threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerceSecurity threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerce
 
08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
 
Securing VoIP Networks
Securing VoIP NetworksSecuring VoIP Networks
Securing VoIP Networks
 
CV_A-Barakat
CV_A-BarakatCV_A-Barakat
CV_A-Barakat
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
Hacking3e ppt ch11
Hacking3e ppt ch11Hacking3e ppt ch11
Hacking3e ppt ch11
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)
 

Ähnlich wie Information Security: DBPO

CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfJayaMalaR6
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk MitigationMukalele Rogers
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetRichardus Indrajit
 
The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...lior mazor
 
Information security[277]
Information security[277]Information security[277]
Information security[277]Timothy Warren
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummiesV-ICT-OR
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
 
ISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptxISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptxMukesh Pant
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Leonardo
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxlevimax2
 

Ähnlich wie Information Security: DBPO (20)

CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
ISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptxISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptx
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 
Security in it
Security in it Security in it
Security in it
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 

Kürzlich hochgeladen

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 

Kürzlich hochgeladen (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Information Security: DBPO

  • 1. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Information Security Sukant Kole Advanced Centre for Informatics & Innovative Learning Indira Gandhi National Open University, New Delhi August 24, 2010 Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 2. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies What is Information Security ? Definition Information Security means protection of information and information system from unauthorized access, modification and misuse of information or destruction. Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 3. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies What is Information Security ? Definition Information Security means protection of information and information system from unauthorized access, modification and misuse of information or destruction. Impact of Weather Forecasting & Flight Scheduling System Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 4. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Integrity Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 5. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Integrity Confidentiality Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 6. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Integrity Confidentiality Availability Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 7. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Integrity Confidentiality Availability Security Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 8. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Integrity Confidentiality Availability Security Privacy Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 9. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 10. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 11. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 12. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 13. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 14. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 15. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 16. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 17. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 18. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Cloud computing security Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 19. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Cloud computing security Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 20. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Cloud computing security Cyber Espionage Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 21. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Access restriction to datacentre, Security surveillance, Disaster Recovery Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 22. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Access restriction to datacentre, Security surveillance, Disaster Recovery VLAN, Authentication Authorization & Auditing service, WPA-PSK Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 23. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Access restriction to datacentre, Security surveillance, Disaster Recovery VLAN, Authentication Authorization & Auditing service, WPA-PSK Security patches, Stable version, 3 tier architecture Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 24. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies What is encryption ? Definition “....In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext....” (Source: Wikipedia) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 25. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Symmetric Encryption (Ref: http://www.devx.com/dbzone/Article/29232/1954) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 26. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Asymmetric Encryption (Ref: www.uic.edu/depts/accc/newsletter/adn26/figure2.html) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 27. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 28. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 29. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies (Password, Resource Access) IT Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 30. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies (Password, Resource Access) IT Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 31. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies (Password, Resource Access) IT Policies (Backup, firewall, IDS & IPS) General Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 32. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies (Password, Resource Access) IT Policies (Backup, firewall, IDS & IPS) General Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 33. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies (Password, Resource Access) IT Policies (Backup, firewall, IDS & IPS) General (Service License Agreement, Business Continuity) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 34. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 35. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 36. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 37. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 38. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 39. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 40. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 41. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 42. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm (Morris Worm, November 2, 1988) Trojan Horses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 43. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm (Morris Worm, November 2, 1988) Trojan Horses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 44. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm (Morris Worm, November 2, 1988) Trojan Horses Social Engineering attacks Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 45. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Definition “....In the field of networking, the specialist area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources....” (Source: Wikipedia) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 46. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 47. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 48. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Unauthorized access to resources (unsecured LAN /WLAN network points) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 49. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Unauthorized access to resources (unsecured LAN /WLAN network points) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 50. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Unauthorized access to resources (unsecured LAN /WLAN network points) MAC Spoofing, Man-in-the-middle attack Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 51. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 52. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 53. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 54. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 55. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 56. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 57. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Directory Services (LDAP, MS-ADS) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 58. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Directory Services (LDAP, MS-ADS) Vulnerability Assessment tools (Nessus, Wireshark) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 59. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Directory Services (LDAP, MS-ADS) Vulnerability Assessment tools (Nessus, Wireshark) Penetration Testing assessment Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 60. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices De-Militarized Zones Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 61. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices De-Militarized Zones Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 62. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices De-Militarized Zones Virtual LANs Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 63. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices De-Militarized Zones Virtual LANs Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 64. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices De-Militarized Zones Virtual LANs Authentication, Authorization, Auditing Service (Desktop, Web) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 65. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting