Security & Privacy of Information Technology
Upcoming SlideShare
Loading in...5
×
 

Security & Privacy of Information Technology

on

  • 374 views

It will give you all a good insight of how the security and privacy is handled.

It will give you all a good insight of how the security and privacy is handled.

Statistics

Views

Total Views
374
Views on SlideShare
373
Embed Views
1

Actions

Likes
0
Downloads
12
Comments
0

1 Embed 1

http://www.techgig.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Security & Privacy of Information Technology Security & Privacy of Information Technology Presentation Transcript

  • Group Members :  Sebina Sebastian (P-40)  Ashish Mathew (P-07)  Tushar Pahurkar (P-48)  Samiksha Thanekar (P-37)  Ishan Mahadik (P-11)
  • What is Security? Is the protection of assets. The three main aspects are: • Prevention • Detection • Re-action
  • Computer Security: It deals with the prevention and detection of unauthorised actions by users of a computer system.
  • Information Security  It is more than just protecting hardware and software from being crashed  It’s about protecting the information resources that keep the company operating  Goals are to ensure:  Data integrity, availability and confidentiality  Business continuity
  • Risk
  • Risks and Threats  Fraud o Computer manipulation o Damage or modification of computer data  Service interruptions and delays  Intrusions  Information manipulation
  • Risks and Threats  Denial of service attacks o Flood attack o Ping attack o SYN attack o Teardrop attack o Smurf attack  Error  Information theft
  • Risks and Threats • Malicious software o Trojan horse o Worms o Boot sector virus • Web site defacements
  • Risks and Threats  Extortion  Sniffing
  • Risks and Threats  Spoofing
  • Risks and Threats  Con artists  Phishing or Fishing
  • COMPUTER CRIMINALS  Hacker  Script kiddies  Cyber-criminals  Organized crime
  • COMPUTER CRIMINALS  Terrorists  Insiders
  • CIA triad
  •  Internal Controls  Physical  Technical  Administrative
  • Technical Countermeasures  Firewalls:
  •  Encryption/decryption
  • • Virtual Private Networks (VPNs)
  • • Backup
  • Security’s Five Pillars Non-repudiation Integrity Privacy Identification Authentication`
  •  Authentication  Identification  Privacy
  •  Integrity  Non-repudiation
  • Conclusion