Security Measures                                Presented By:                                Priyank Bothra              ...
Computer Crime   The unauthorized use, access, modification, and destruction of    hardware, software, data, or network r...
Cyber Crime Safeguards
Different Types of Computer Crimes1.    Hacking2.    Cyber theft3.    Unauthorized use at work4.    Piracy5.    Virus & Wo...
Common Hacking Tactics1.    Denial of Service2.    Scans3.    Sniffer4.    Spoofing5.    Trojan Horse6.    Back Doors7.   ...
Internet Abuses at Workplace               Security Management   6
Security Management   The goal of security    management       is   the    accuracy, integrity, and    safety of all info...
Internetworked Security Defenses   Encryption       Data is transmitted in scrambled form       It is unscrambled by co...
Internetworked Security Defenses   Firewalls       A gatekeeper system that        protects a company’s intranets       ...
Internet and Intranet Firewalls                Security Management   10
Internetworked Security Defenses   Email Monitoring       Use of content monitoring software that scans        for troub...
Other Security Measures   Security Codes       Multilevel password system       Encrypted passwords       Smart cards ...
Other Security Measures   Biometrics       Computer devices measure physical traits        that make each individual uni...
Other Security Measures   In the event of a system failure, fault-    tolerant    systems       have     redundant    pro...
Common Biometric Verification schemes:   Face geometry   Fingerprints   Hand geometry   Blood vessel pattern in the re...
Internet Security                    16
Securing your system   4 easy steps you can take!    1. Firewall Ex. ZoneAlarm    2. Anti Virus Ex. AVGFree    3. Anti Sp...
The future of secure web connections   Extended Validation Certificates    Current system       Internet Explorer       F...
The future of secure web connectionsExtra information                    Security Management   19
Protecting data   Using strong encryption   Password protected   Encryption   Whole disk encryption                   ...
Wireless security   WLAN, WPA, ETC...   What are the risks?   Turning on encryption   Public access                   ...
Captchas   What are captchas?   Do captchas work?   Relay attack   What about using objects?   A new twist on captcha...
Database security   SQL injections and other threats   Good user names and passwords   Privilege escalation   Extra ex...
Other Security measures1.   Disaster Recovery system2.   Fault tolerant system3.   Security codes                    Secur...
Disaster Recovery Planning:   What is Disaster Recovery Planning?    - Restoration of Computing and                      ...
Types of Disaster Recovery   Hot Site   Warm Site   Cold Site                Security Management   26
Hot site:   An alternate facility or backup site   Equipped with       Computers       Telecommunications       envir...
Warm site:   An alternate facility or backup processing site   Equipped with       Preconfigured Hardware       Data L...
Cold site:   An alternate facility   Have Environmental infrastructure   No Pre-installed   Provisioned at Time of Dis...
Security codes   What is the Security Code?       Codes used to secure           Files           Data           Money...
Thank You   Security Management   31
Upcoming SlideShare
Loading in …5
×

Security management(new) (1)

456 views

Published on

Security Mesurment

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
456
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
24
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Security management(new) (1)

  1. 1. Security Measures Presented By: Priyank Bothra Devin Chakravarti Jayesh Chandegara Divyesh Chauhan Security Management 1
  2. 2. Computer Crime The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources The unauthorized release of information The unauthorized copying of software Denying an end user access to his or her own hardware, software, data, or network resources Using or conspiring to use computer or network resources illegally to obtain information or tangible property
  3. 3. Cyber Crime Safeguards
  4. 4. Different Types of Computer Crimes1. Hacking2. Cyber theft3. Unauthorized use at work4. Piracy5. Virus & Worms6. Internet Abuses at Workplace7. Privacy issues8. Computer Matching9. Theft of Intellectual Property10. Phishing fraud11. Adware and Spyware Security Management 4
  5. 5. Common Hacking Tactics1. Denial of Service2. Scans3. Sniffer4. Spoofing5. Trojan Horse6. Back Doors7. War Dialling8. Logic Bombs9. Buffer Overflow10. Password Crackers11. Social Engineering12. Dumpster Driving Security Management 5
  6. 6. Internet Abuses at Workplace Security Management 6
  7. 7. Security Management The goal of security management is the accuracy, integrity, and safety of all information system processes and resources.
  8. 8. Internetworked Security Defenses Encryption  Data is transmitted in scrambled form  It is unscrambled by computer systems for authorized users only  The most widely used method uses a pair of public and private keys unique to each individual Public key – encrypts the data. Private key – decrypts the data Security Management 8
  9. 9. Internetworked Security Defenses Firewalls  A gatekeeper system that protects a company’s intranets and other computer networks from intrusion  Provides a filter and safe transfer point for access to/from the Internet and other networks Security Management 9
  10. 10. Internet and Intranet Firewalls Security Management 10
  11. 11. Internetworked Security Defenses Email Monitoring  Use of content monitoring software that scans for troublesome words that might compromise corporate security Anti-Virus  Centralize the updating and distribution of antivirus software  Use a security suite that integrates virus protection with firewalls, Web security, and content blocking features Security Management 11
  12. 12. Other Security Measures Security Codes  Multilevel password system  Encrypted passwords  Smart cards with microprocessors Backup Files  Duplicate files of data or programs Security Monitors  Monitor the use of computers and networks  Protects them from unauthorized use, fraud, and destruction Security Management 12
  13. 13. Other Security Measures Biometrics  Computer devices measure physical traits that make each individual unique  Fingerprints, retina scan Computer Failure Controls  Prevents computer failures or minimizes its effects  Preventive maintenance  Arrange backups with a disaster recovery organization Security Management 13
  14. 14. Other Security Measures In the event of a system failure, fault- tolerant systems have redundant processors, peripherals, and software. A disaster recovery plan contains formalized procedures to follow in the event of a disaster Security Management 14
  15. 15. Common Biometric Verification schemes: Face geometry Fingerprints Hand geometry Blood vessel pattern in the retina of a person’s eye Voice Signature Keystroke dynamics Facial thermography Iris scan Using password or PIN Security Management 15
  16. 16. Internet Security 16
  17. 17. Securing your system 4 easy steps you can take! 1. Firewall Ex. ZoneAlarm 2. Anti Virus Ex. AVGFree 3. Anti Spyware Ex. Ad-Aware 4. Updates Security Management 17
  18. 18. The future of secure web connections Extended Validation Certificates Current system Internet Explorer Firefox New system Internet Explorer 7 Firefox 3 Security Management 18
  19. 19. The future of secure web connectionsExtra information Security Management 19
  20. 20. Protecting data Using strong encryption Password protected Encryption Whole disk encryption Security Management 20
  21. 21. Wireless security WLAN, WPA, ETC... What are the risks? Turning on encryption Public access Security Management 21
  22. 22. Captchas What are captchas? Do captchas work? Relay attack What about using objects? A new twist on captchas A note about accessibility Security Management 22
  23. 23. Database security SQL injections and other threats Good user names and passwords Privilege escalation Extra extensions Security Management 23
  24. 24. Other Security measures1. Disaster Recovery system2. Fault tolerant system3. Security codes Security Management 24
  25. 25. Disaster Recovery Planning: What is Disaster Recovery Planning? - Restoration of Computing and Communication Services - Disrupted By Events Primarily Focus on Technical Issues Maintenance of Back-up Example: MasterCard In St. Louis Security Management 25
  26. 26. Types of Disaster Recovery Hot Site Warm Site Cold Site Security Management 26
  27. 27. Hot site: An alternate facility or backup site Equipped with  Computers  Telecommunications  environmental infrastructure Replication of Data  From Live site to the Hot site Security Management 27
  28. 28. Warm site: An alternate facility or backup processing site Equipped with  Preconfigured Hardware  Data Links  Communication Interfaces  Electrical and Environmental Condition Replication of Data  No Live Data  Direct to warm site Security Management 28
  29. 29. Cold site: An alternate facility Have Environmental infrastructure No Pre-installed Provisioned at Time of Disaster Security Management 29
  30. 30. Security codes What is the Security Code?  Codes used to secure  Files  Data  Money (Eg. Credit Cards) Key to Lock For Safety Future Security Codes  All Biometrics Security Management 30
  31. 31. Thank You Security Management 31

×