SlideShare a Scribd company logo
1 of 19
SECURITY MANAGEMENT
UNIT FOUR
INTRODUCTION
• IT security management consists of processes to enable organizational structure
and technology to protect an organization's IT operations and assets against
internal and external threats, intentional or otherwise.
• These processes are developed to ensure confidentiality, integrity, and availability
of IT systems. Various aspects to IT security in an organization need to be
considered. These include security policies and procedures, security organization
structure, IT security processes, and rules and regulations.
SECURITY PRINCIPLES
1) Informed: 2) Directed:
3) Independent: 4) Cooperative:
5) Monitored: 6) Consistent:
7) Unpredictable: 8) Concentrated:
9) Appreciated: 10) Acceptable:
THREATS
COMPUTER
SECURITY
• computer security, also called cybersecurity, the
protection of computer systems and information
from harm, theft, and unauthorized use. Computer
hardware is typically protected by the same means
used to protect other valuable or sensitive
equipment—namely, serial numbers, doors and
locks, and alarms.
• The security precautions related to computer
information and access address four major threats:
• (1) theft of data, (2) vandalism, including the
destruction of data by a computer virus;
• (3) fraud,(4) invasion of privacy,
INTERNET
SECURITY
• Internet security is a branch of computer
security. It encompasses the Internet, browser
security, web site security and network security as
it applies to other applications or operating
systems as a whole.
• The Internet is an inherently insecure channel for
information exchange, with high risk
of intrusion or fraud, such as phishing
online viruses, trojans, ransomware and worms.
THREATS
• Malicious software
• Denial-of-service attacks
• Phishing
• Application vulnerabilities
COUNTERMEASURES
• Network layer security
• Internet Protocol Security (IPsec)
• Threat modeling
• Multi-factor authentication
• Security token
• Electronic mail security
• Firewalls
PHYSICAL
SECURITY
• Physical security is the protection of personnel,
hardware, software, networks and data from
physical actions and events that could cause
serious loss or damage to an enterprise, agency or
institution.
• The physical security framework is made up of
three main components:
• Access control
• surveillance
• testing.
IDENTITY MANAGEMENT (ID MANAGEMENT)
• Identity management (ID management) is the
organizational process for ensuring individuals
have the appropriate access to technology
resources.
• This includes the identification, authentication
and authorization of a person, or persons, to
have access to applications, systems or
networks.
• IdM systems fall under the overarching
umbrellas of IT security and data management.
Identity and access management systems not
only identify, authenticate, and control access
for individuals who will be utilizing IT resources
but also the hardware and applications
employees need to access.
IAM
ACCESS
CONTROL
SYSTEM
• Access control systems are the electronic systems
that are designed to control through a network and
they should have an access to a network.
• Access Control System recognizes authenticates and
authorizes entry of a person to enter into the
premise thereby giving complete protection
ensuring security with the system.
• The areas or organizations which require high
security use different types of access control systems
like bio metric, RFID, door controllers and card
readers etc
• Each access point may be controlled individually as
per the requirement of company or organizations
where high security is necessary.
ACCESS
CONTROL
SYSTEM
IAM
COMPONENTS
INTRUSION
DETECTION
• An Intrusion Detection System (IDS) is a system
that monitors network traffic for suspicious
activity and issues alerts when such activity is
discovered.
• It is a software application that scans a network or
a system for the harmful activity or policy
breaching. Any malicious venture or violation is
normally reported either to an administrator or
collected centrally using a security information
and event management (SIEM) system.
• Intrusion prevention systems also monitor
network packets inbound the system to check the
malicious activities involved in it and at once send
the warning notifications.
This Photo by Unknown Author is licensed under CC BY-SA
CLASSIFICATION OF
INTRUSION
DETECTION SYSTEM
• Network Intrusion Detection System (NIDS):
• Host Intrusion Detection System (HIDS):
• Protocol-based Intrusion Detection System (PIDS):
• Application Protocol-based Intrusion Detection
System (APIDS):
• Hybrid Intrusion Detection System :
CLASSIFICATION OF INTRUSION DETECTION
SYSTEM
Network Intrusion
Detection System
(NIDS):
Host Intrusion
Detection System
(HIDS):
Protocol-based
Intrusion Detection
System (PIDS):
Application
Protocol-based
Intrusion Detection
System (APIDS):
Hybrid Intrusion
Detection System :
DETECTION
METHOD OF
IDS
• Signature-based Method:
Signature-based IDS detects the attacks on the
basis of the specific patterns such as number of
bytes or number of 1’s or number of 0’s in the
network traffic
• Anomaly-based Method
Anomaly-based IDS was introduced to detect
unknown malware attacks as new malware are
developed rapidly. In anomaly-based IDS there is
use of machine learning to create a trustful activity
model and anything coming is compared with that
model and it is declared suspicious if it is not found
in model.
COMPARISON OF
IDS WITH
FIREWALLS:
• IDS and firewall both are related to network
security but an IDS differs from a firewall as a
firewall looks outwardly for intrusions in order to
stop them from happening. Firewalls restrict access
between networks to prevent intrusion and if an
attack is from inside the network it doesn’t signal.
• An IDS describes a suspected intrusion once it has
happened and then signals an alarm.

More Related Content

Similar to Unit four .pptx

Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis Belsis MPhil/MRes/BSc
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostPrecisely
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in misVishal Patyal
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptRAJESH S
 
Information Security Fundamentals
Information Security FundamentalsInformation Security Fundamentals
Information Security FundamentalsThe Avi Sharma
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxTikdiPatel
 
Information Security
Information Security Information Security
Information Security Alok Katiyar
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commercehidivin652
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Knoldus Inc.
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdfdhanywahyudi17
 

Similar to Unit four .pptx (20)

Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
Unit-5.pptx
Unit-5.pptxUnit-5.pptx
Unit-5.pptx
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
Intrusion in computing
Intrusion in computingIntrusion in computing
Intrusion in computing
 
Information Security Fundamentals
Information Security FundamentalsInformation Security Fundamentals
Information Security Fundamentals
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Information Security
Information Security Information Security
Information Security
 
Ecommerce_Ch4.pptx
Ecommerce_Ch4.pptxEcommerce_Ch4.pptx
Ecommerce_Ch4.pptx
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Unit v
Unit vUnit v
Unit v
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
 

More from BLACKSPAROW

DICTIONARY USING.pptx
DICTIONARY USING.pptxDICTIONARY USING.pptx
DICTIONARY USING.pptxBLACKSPAROW
 
Soft skills and it’s Importance (1).pptx
Soft skills and it’s Importance (1).pptxSoft skills and it’s Importance (1).pptx
Soft skills and it’s Importance (1).pptxBLACKSPAROW
 
Unit 6 - PART2.pptx
Unit 6 - PART2.pptxUnit 6 - PART2.pptx
Unit 6 - PART2.pptxBLACKSPAROW
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxBLACKSPAROW
 
digital signature algo.pptx
digital signature algo.pptxdigital signature algo.pptx
digital signature algo.pptxBLACKSPAROW
 

More from BLACKSPAROW (13)

DICTIONARY USING.pptx
DICTIONARY USING.pptxDICTIONARY USING.pptx
DICTIONARY USING.pptx
 
ix d.pptx
ix d.pptxix d.pptx
ix d.pptx
 
Soft skills and it’s Importance (1).pptx
Soft skills and it’s Importance (1).pptxSoft skills and it’s Importance (1).pptx
Soft skills and it’s Importance (1).pptx
 
Unit 6 - PART2.pptx
Unit 6 - PART2.pptxUnit 6 - PART2.pptx
Unit 6 - PART2.pptx
 
Unit 4.pptx
Unit 4.pptxUnit 4.pptx
Unit 4.pptx
 
80386-1.pptx
80386-1.pptx80386-1.pptx
80386-1.pptx
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
 
24.pptx
24.pptx24.pptx
24.pptx
 
1791.pptx
1791.pptx1791.pptx
1791.pptx
 
UNIT 3.pptx
UNIT 3.pptxUNIT 3.pptx
UNIT 3.pptx
 
UNIT 2.pptx
UNIT 2.pptxUNIT 2.pptx
UNIT 2.pptx
 
ECC_basics.ppt
ECC_basics.pptECC_basics.ppt
ECC_basics.ppt
 
digital signature algo.pptx
digital signature algo.pptxdigital signature algo.pptx
digital signature algo.pptx
 

Recently uploaded

Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 

Recently uploaded (20)

Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 

Unit four .pptx

  • 2. INTRODUCTION • IT security management consists of processes to enable organizational structure and technology to protect an organization's IT operations and assets against internal and external threats, intentional or otherwise. • These processes are developed to ensure confidentiality, integrity, and availability of IT systems. Various aspects to IT security in an organization need to be considered. These include security policies and procedures, security organization structure, IT security processes, and rules and regulations.
  • 3. SECURITY PRINCIPLES 1) Informed: 2) Directed: 3) Independent: 4) Cooperative: 5) Monitored: 6) Consistent: 7) Unpredictable: 8) Concentrated: 9) Appreciated: 10) Acceptable:
  • 5. COMPUTER SECURITY • computer security, also called cybersecurity, the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms. • The security precautions related to computer information and access address four major threats: • (1) theft of data, (2) vandalism, including the destruction of data by a computer virus; • (3) fraud,(4) invasion of privacy,
  • 6. INTERNET SECURITY • Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security and network security as it applies to other applications or operating systems as a whole. • The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing online viruses, trojans, ransomware and worms.
  • 7. THREATS • Malicious software • Denial-of-service attacks • Phishing • Application vulnerabilities
  • 8. COUNTERMEASURES • Network layer security • Internet Protocol Security (IPsec) • Threat modeling • Multi-factor authentication • Security token • Electronic mail security • Firewalls
  • 9. PHYSICAL SECURITY • Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. • The physical security framework is made up of three main components: • Access control • surveillance • testing.
  • 10. IDENTITY MANAGEMENT (ID MANAGEMENT) • Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to technology resources. • This includes the identification, authentication and authorization of a person, or persons, to have access to applications, systems or networks. • IdM systems fall under the overarching umbrellas of IT security and data management. Identity and access management systems not only identify, authenticate, and control access for individuals who will be utilizing IT resources but also the hardware and applications employees need to access.
  • 11. IAM
  • 12. ACCESS CONTROL SYSTEM • Access control systems are the electronic systems that are designed to control through a network and they should have an access to a network. • Access Control System recognizes authenticates and authorizes entry of a person to enter into the premise thereby giving complete protection ensuring security with the system. • The areas or organizations which require high security use different types of access control systems like bio metric, RFID, door controllers and card readers etc • Each access point may be controlled individually as per the requirement of company or organizations where high security is necessary.
  • 15. INTRUSION DETECTION • An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. • It is a software application that scans a network or a system for the harmful activity or policy breaching. Any malicious venture or violation is normally reported either to an administrator or collected centrally using a security information and event management (SIEM) system. • Intrusion prevention systems also monitor network packets inbound the system to check the malicious activities involved in it and at once send the warning notifications. This Photo by Unknown Author is licensed under CC BY-SA
  • 16. CLASSIFICATION OF INTRUSION DETECTION SYSTEM • Network Intrusion Detection System (NIDS): • Host Intrusion Detection System (HIDS): • Protocol-based Intrusion Detection System (PIDS): • Application Protocol-based Intrusion Detection System (APIDS): • Hybrid Intrusion Detection System :
  • 17. CLASSIFICATION OF INTRUSION DETECTION SYSTEM Network Intrusion Detection System (NIDS): Host Intrusion Detection System (HIDS): Protocol-based Intrusion Detection System (PIDS): Application Protocol-based Intrusion Detection System (APIDS): Hybrid Intrusion Detection System :
  • 18. DETECTION METHOD OF IDS • Signature-based Method: Signature-based IDS detects the attacks on the basis of the specific patterns such as number of bytes or number of 1’s or number of 0’s in the network traffic • Anomaly-based Method Anomaly-based IDS was introduced to detect unknown malware attacks as new malware are developed rapidly. In anomaly-based IDS there is use of machine learning to create a trustful activity model and anything coming is compared with that model and it is declared suspicious if it is not found in model.
  • 19. COMPARISON OF IDS WITH FIREWALLS: • IDS and firewall both are related to network security but an IDS differs from a firewall as a firewall looks outwardly for intrusions in order to stop them from happening. Firewalls restrict access between networks to prevent intrusion and if an attack is from inside the network it doesn’t signal. • An IDS describes a suspected intrusion once it has happened and then signals an alarm.