Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!

Information Security: DBPO

on

  • 528 views

This is a presentation on Information Security module as part of Diploma in Business Process Outsourcing by SOVET, IGNOU

This is a presentation on Information Security module as part of Diploma in Business Process Outsourcing by SOVET, IGNOU

Statistics

Views

Total Views
528
Views on SlideShare
528
Embed Views
0

Actions

Likes
0
Downloads
13
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Information Security: DBPO Information Security: DBPO Presentation Transcript

  • Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Information Security Sukant Kole Advanced Centre for Informatics & Innovative Learning Indira Gandhi National Open University, New Delhi August 24, 2010 Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies What is Information Security ? Definition Information Security means protection of information and information system from unauthorized access, modification and misuse of information or destruction. Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies What is Information Security ? Definition Information Security means protection of information and information system from unauthorized access, modification and misuse of information or destruction. Impact of Weather Forecasting & Flight Scheduling System Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Integrity Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Integrity Confidentiality Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Integrity Confidentiality Availability Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Integrity Confidentiality Availability Security Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Integrity Confidentiality Availability Security Privacy Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Physical Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Physical Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Cloud computing security Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Cloud computing security Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Cloud computing security Cyber Espionage Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Access restriction to datacentre, Security surveillance, Disaster Recovery Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Access restriction to datacentre, Security surveillance, Disaster Recovery VLAN, Authentication Authorization & Auditing service, WPA-PSK Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Access restriction to datacentre, Security surveillance, Disaster Recovery VLAN, Authentication Authorization & Auditing service, WPA-PSK Security patches, Stable version, 3 tier architecture Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies What is encryption ? Definition “....In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext....” (Source: Wikipedia) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Symmetric Encryption (Ref: http://www.devx.com/dbzone/Article/29232/1954) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies Asymmetric Encryption (Ref: www.uic.edu/depts/accc/newsletter/adn26/figure2.html) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies User Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies User Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies User Policies (Password, Resource Access) IT Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies User Policies (Password, Resource Access) IT Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies User Policies (Password, Resource Access) IT Policies (Backup, firewall, IDS & IPS) General Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies User Policies (Password, Resource Access) IT Policies (Backup, firewall, IDS & IPS) General Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Introduction Information Security Concerns Attributes of Information Security Software Vulnerabilties Type of threats Network Security and Authentication Types of security measures Open Discussion Encryption Security Policies User Policies (Password, Resource Access) IT Policies (Backup, firewall, IDS & IPS) General (Service License Agreement, Business Continuity) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm (Morris Worm, November 2, 1988) Trojan Horses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm (Morris Worm, November 2, 1988) Trojan Horses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm (Morris Worm, November 2, 1988) Trojan Horses Social Engineering attacks Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices Definition “....In the field of networking, the specialist area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources....” (Source: Wikipedia) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Unauthorized access to resources (unsecured LAN /WLAN network points) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Unauthorized access to resources (unsecured LAN /WLAN network points) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Unauthorized access to resources (unsecured LAN /WLAN network points) MAC Spoofing, Man-in-the-middle attack Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices Firewall [Software, Hardware] Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Directory Services (LDAP, MS-ADS) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Directory Services (LDAP, MS-ADS) Vulnerability Assessment tools (Nessus, Wireshark) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Directory Services (LDAP, MS-ADS) Vulnerability Assessment tools (Nessus, Wireshark) Penetration Testing assessment Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices De-Militarized Zones Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices De-Militarized Zones Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices De-Militarized Zones Virtual LANs Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices De-Militarized Zones Virtual LANs Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns What is network security Software Vulnerabilties Threats to network security Network Security and Authentication Tools of network security Open Discussion Secure network devices De-Militarized Zones Virtual LANs Authentication, Authorization, Auditing Service (Desktop, Web) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting