Information Security Management - Hansa Edirisinghe
Upcoming SlideShare
Loading in...5
×
 

Information Security Management - Hansa Edirisinghe

on

  • 670 views

The presentation for "Critique the employment of ethical hacking as a way of reviewing and strengthening the security of information systems" prepared by Hansa Edirisinghe. (MSc IT - Cardiff ...

The presentation for "Critique the employment of ethical hacking as a way of reviewing and strengthening the security of information systems" prepared by Hansa Edirisinghe. (MSc IT - Cardiff Metropolitan University, UK
)

Statistics

Views

Total Views
670
Views on SlideShare
670
Embed Views
0

Actions

Likes
0
Downloads
4
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Information Security Management - Hansa Edirisinghe Information Security Management - Hansa Edirisinghe Presentation Transcript

  • MSc CIS7027 Information Security Management ASSIGNMENT 2012 Critique the employment of ethical hacking as a way of reviewing and strengthening the security of information systems Hansa Edirisinghe BSc (Hons) University of Portsmouth, UK MSc IT - Cardiff Metropolitan University, UK
  • Why did I selected this topic ? • Hacking is a major security threat in IT • Organizations find solutions to prevent their system from hackers • Employment of Ethical Hacker (EH) is becoming popular to prevent attacks
  • How critical the Hacking is? (According to hackmageddon.com, hacking attacks in the month of October 2012) Source : http://hackmageddon.com/2012-cyber-attacks-timeline-master-index/
  • Hackers White Hat People who specialized hacking check the faults of the system Grey Hat Exploit a security to the attention of the owners Black Hat People who break into networks and harm to the network and property White Hat is known as Ethical Hacker
  • Strengthening the security through EH • Ensuring the protection of company confidential information (i.e. Finance, Production, Marketing, R & D ) • Protect the system from malware/hacking • Analyze risk assessment and control vulnerable areas • Ensure that sensitive information of clients does not go to wrong hands
  • Barriers to EH • Heavy dependence of employee, because EH has all the company secret information • Finding a competent and specialist person • Frequent employee turnover may cause problems to the organization
  • “The employment of ethical hacking as a way of reviewing and strengthening the security of information systems” 1. Introduction to EH 2. Discussions on, a) Ensuring the protection of company confidential information b) Protect the system from malware/hacking c) Risk assessment and control vulnerable areas d) Ensuring sensitive information of clients does not go to wrong hands e) Barriers to EH 3. Evaluation & Recommendation 4. Conclusion Framework of my Report
  • Thank You