Your SlideShare is downloading. ×
Information Security Management - Hansa Edirisinghe
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Information Security Management - Hansa Edirisinghe

447

Published on

The presentation for "Critique the employment of ethical hacking as a way of reviewing and strengthening the security of information systems" prepared by Hansa Edirisinghe. (MSc IT - Cardiff …

The presentation for "Critique the employment of ethical hacking as a way of reviewing and strengthening the security of information systems" prepared by Hansa Edirisinghe. (MSc IT - Cardiff Metropolitan University, UK
)

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
447
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. MSc CIS7027 Information Security Management ASSIGNMENT 2012 Critique the employment of ethical hacking as a way of reviewing and strengthening the security of information systems Hansa Edirisinghe BSc (Hons) University of Portsmouth, UK MSc IT - Cardiff Metropolitan University, UK
  • 2. Why did I selected this topic ? • Hacking is a major security threat in IT • Organizations find solutions to prevent their system from hackers • Employment of Ethical Hacker (EH) is becoming popular to prevent attacks
  • 3. How critical the Hacking is? (According to hackmageddon.com, hacking attacks in the month of October 2012) Source : http://hackmageddon.com/2012-cyber-attacks-timeline-master-index/
  • 4. Hackers White Hat People who specialized hacking check the faults of the system Grey Hat Exploit a security to the attention of the owners Black Hat People who break into networks and harm to the network and property White Hat is known as Ethical Hacker
  • 5. Strengthening the security through EH • Ensuring the protection of company confidential information (i.e. Finance, Production, Marketing, R & D ) • Protect the system from malware/hacking • Analyze risk assessment and control vulnerable areas • Ensure that sensitive information of clients does not go to wrong hands
  • 6. Barriers to EH • Heavy dependence of employee, because EH has all the company secret information • Finding a competent and specialist person • Frequent employee turnover may cause problems to the organization
  • 7. “The employment of ethical hacking as a way of reviewing and strengthening the security of information systems” 1. Introduction to EH 2. Discussions on, a) Ensuring the protection of company confidential information b) Protect the system from malware/hacking c) Risk assessment and control vulnerable areas d) Ensuring sensitive information of clients does not go to wrong hands e) Barriers to EH 3. Evaluation & Recommendation 4. Conclusion Framework of my Report
  • 8. Thank You

×