SlideShare a Scribd company logo
1 of 22
Information vulnerability
and disaster management
Ambika.R
Balachandiran.N
Buela.L
Joshua.S
31/3/2017
vulnerability
Vulnerability is a cyber-security term that
refers to a flaw in a system that can leave it
open to attack.
Why Systems Are Vulnerable
• Hardware problems
Breakdowns, configuration errors, damage from improper use or
crime
• Software problems
Programming errors, installation errors, unauthorized changes
• Disasters
Power failures, flood, fires, and so on
• Use of networks and computers outside of firm’s
control
E.g., with domestic or offshore outsourcing vendors
Malicious Software: Viruses, Worms, Trojan Horses,
and Spyware
• Viruses
Rogue software program that attaches itself to other software
programs or data files in order to be executed
• Worms
Independent computer programs that copy themselves from
one computer to other computers over a network
• Trojan horses
Software program that appears to be benign but then does
something other than expected.
Malicious Software: Viruses, Worms, Trojan Horses,
and Spyware
• Spyware
Small programs install themselves surreptitiously on
computers to monitor user Web surfing activity and serve up
advertising
• Key loggers
Record every keystroke on computer to steal serial numbers,
passwords, launch Internet attacks
Hackers and Computer Crime
• Computer crime
• Defined as “any violations of criminal law that involve a
knowledge of computer technology for their perpetration,
investigation, or prosecution”
• Computer may be target of crime:
• Breaching confidentiality of protected computerized data
• Accessing a computer system without authority
• Computer may be instrument of crime:
• Theft of trade secrets
• Using e-mail for threats or harassment
Hackers and Computer Crime
• Identity theft
• Theft of personal information (social security id, driver’s
license, or credit card numbers) to impersonate someone else
• Phishing
• Setting up fake Web sites or sending e-mail messages that
look like legitimate businesses to ask users for confidential
personal data
• Evil twins
• Wireless networks that pretend to offer trustworthy Wi-Fi
connections to the Internet
Hackers and Computer Crime
• Pharming
• Redirects users to a bogus Web page, even when
individual types correct Web page address into his
or her browser
• Click fraud
• Occurs when individual or computer program
fraudulently clicks on online ad without any
intention of learning more about the advertiser or
making a purchase
Disaster
Management
What is disaster management ???
“A disaster can be defined as any occurrence that cause damage,
ecological disruption, loss of human life, deterioration of health and
health services on a scale, sufficient to warrant an extraordinary
response from outside the affected community or area”.
(W.H.O.)
BACKGROUND
The reasons for this are varied including:
 an increasing population pressures in urban areas
 an increase in the extent of encroachment into lands, e.g., river beds or
drainage courses, low lying areas etc.
 poor or ignored zoning laws and policies
 lack of proper risk management (insurance)
TYPES OF DISASTER
Natural
Disasters
Meteorological
Topographical
Environmental
Man-made
Disasters
Technological
Industrial
accidents
Security
related
Indian Meteorological department (IMD) plays a key role in forewarning the
disaster of cyclone-storms by detection tracing. It has 5 centres in Kolkata,
Bhubaneswar, Vishakapatanam, Chennai & Mumbai. In addition there are 31
special observation posts setup a long the east coast of India.
The International Agencies which provides humanitarian assistance to the
disaster strike areas are United Nation agencies.
 Office for the co-ordination of Humanitarian Affair (OCHA)
 World Health Organization (WHO)
 UNICEF
 World Food Programme (WFP)
 Food & Agricultural Organisation (FAD)
forewarning of disaster
Contd….
E.g.: Non Governmental Organizations
Co-Operative American Relief Every where (CARE)
International committee of Red cross
International committee of Red cross
Disaster impact
India’s Vulnerability to Disasters
57% land is vulnerable to earthquakes. Of these, 12% is vulnerable to severe
earthquakes.
68% land is vulnerable to drought.
12% land is vulnerable to floods.
8% land is vulnerable to cyclones.
Apart from natural disasters, some cities in India are also vulnerable to
chemical and industrial disasters and man-made disasters.
Disaster response
Epidemiologic surveillance and disease control
 Vaccination
Nutrition
Rehabilitation phase
Water supply
Food safety
Basic sanitation and personal hygiene
Vector control
DISASTER-EFFECTS
Deaths
Disability
Increase in communicable disease
Psychological problems
Food shortage
Socioeconomic losses
Shortage of drugs and medical supplies.
Environmental disruption
Lessons Learnt
• Be Prepared : Preparedness and Mitigation is bound to yield
more effective returns than distributing relief after a disaster.
• Create a Culture of Preparedness and Prevention.
• Evolve a code of conduct for all stake-holders
Disaster Reduction Day
NIDM observed "Disaster Reduction Day" on the 12th
October
Rallies and special lectures were organized in the
universities and colleges to mark the initiatives of
awareness for disaster reduction amongst youth & children
Children's Colour Activity Book for Disaster Preparedness
Information vulbnerability and disaster management   information management

More Related Content

Similar to Information vulbnerability and disaster management information management

Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
Numaan Huq
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
shreemala1
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
ramsetl
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterprise
Abha Damani
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 

Similar to Information vulbnerability and disaster management information management (20)

Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Digital security
Digital securityDigital security
Digital security
 
Digital Security
Digital Security Digital Security
Digital Security
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterprise
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Cyber-Terrorism
Cyber-TerrorismCyber-Terrorism
Cyber-Terrorism
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post PandemicCyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
 

More from Hallmark B-school

More from Hallmark B-school (19)

Marketting
MarkettingMarketting
Marketting
 
Buyers Behaviour
Buyers BehaviourBuyers Behaviour
Buyers Behaviour
 
Marketting Strategy
Marketting StrategyMarketting Strategy
Marketting Strategy
 
Marketting Mix decisions
Marketting Mix decisionsMarketting Mix decisions
Marketting Mix decisions
 
Brm unit v - cheet sheet
Brm   unit v - cheet sheetBrm   unit v - cheet sheet
Brm unit v - cheet sheet
 
Brm unit iv - cheet sheet
Brm   unit iv - cheet sheetBrm   unit iv - cheet sheet
Brm unit iv - cheet sheet
 
Brm unit iii - cheet sheet
Brm   unit iii - cheet sheetBrm   unit iii - cheet sheet
Brm unit iii - cheet sheet
 
Brm unit ii - cheet sheet
Brm   unit ii - cheet sheetBrm   unit ii - cheet sheet
Brm unit ii - cheet sheet
 
Brm unit i - cheet sheet
Brm   unit i - cheet sheetBrm   unit i - cheet sheet
Brm unit i - cheet sheet
 
Quantitative and qualitative forecasting techniques om
Quantitative and qualitative forecasting techniques   omQuantitative and qualitative forecasting techniques   om
Quantitative and qualitative forecasting techniques om
 
Material requirement planning and its importance om
Material requirement planning and its importance   omMaterial requirement planning and its importance   om
Material requirement planning and its importance om
 
Erp & role in a corporate om
Erp & role in a corporate   omErp & role in a corporate   om
Erp & role in a corporate om
 
Role of logistics and scm om
Role of logistics and scm   omRole of logistics and scm   om
Role of logistics and scm om
 
Product design influecing factors om
Product design influecing factors   omProduct design influecing factors   om
Product design influecing factors om
 
Work measurement increases productivityand role of jit om
Work measurement increases productivityand role of jit   omWork measurement increases productivityand role of jit   om
Work measurement increases productivityand role of jit om
 
Business intelligence information management
Business intelligence   information managementBusiness intelligence   information management
Business intelligence information management
 
Cloud computing information management
Cloud computing   information managementCloud computing   information management
Cloud computing information management
 
Concurrency computing information management
Concurrency computing   information managementConcurrency computing   information management
Concurrency computing information management
 
Software audiit information management
Software audiit   information managementSoftware audiit   information management
Software audiit information management
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Recently uploaded (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Information vulbnerability and disaster management information management

  • 1. Information vulnerability and disaster management Ambika.R Balachandiran.N Buela.L Joshua.S 31/3/2017
  • 2. vulnerability Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack.
  • 3. Why Systems Are Vulnerable • Hardware problems Breakdowns, configuration errors, damage from improper use or crime • Software problems Programming errors, installation errors, unauthorized changes • Disasters Power failures, flood, fires, and so on • Use of networks and computers outside of firm’s control E.g., with domestic or offshore outsourcing vendors
  • 4. Malicious Software: Viruses, Worms, Trojan Horses, and Spyware • Viruses Rogue software program that attaches itself to other software programs or data files in order to be executed • Worms Independent computer programs that copy themselves from one computer to other computers over a network • Trojan horses Software program that appears to be benign but then does something other than expected.
  • 5. Malicious Software: Viruses, Worms, Trojan Horses, and Spyware • Spyware Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising • Key loggers Record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks
  • 6. Hackers and Computer Crime • Computer crime • Defined as “any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution” • Computer may be target of crime: • Breaching confidentiality of protected computerized data • Accessing a computer system without authority • Computer may be instrument of crime: • Theft of trade secrets • Using e-mail for threats or harassment
  • 7. Hackers and Computer Crime • Identity theft • Theft of personal information (social security id, driver’s license, or credit card numbers) to impersonate someone else • Phishing • Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data • Evil twins • Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet
  • 8. Hackers and Computer Crime • Pharming • Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser • Click fraud • Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase
  • 10. What is disaster management ??? “A disaster can be defined as any occurrence that cause damage, ecological disruption, loss of human life, deterioration of health and health services on a scale, sufficient to warrant an extraordinary response from outside the affected community or area”. (W.H.O.)
  • 11. BACKGROUND The reasons for this are varied including:  an increasing population pressures in urban areas  an increase in the extent of encroachment into lands, e.g., river beds or drainage courses, low lying areas etc.  poor or ignored zoning laws and policies  lack of proper risk management (insurance)
  • 13. Indian Meteorological department (IMD) plays a key role in forewarning the disaster of cyclone-storms by detection tracing. It has 5 centres in Kolkata, Bhubaneswar, Vishakapatanam, Chennai & Mumbai. In addition there are 31 special observation posts setup a long the east coast of India. The International Agencies which provides humanitarian assistance to the disaster strike areas are United Nation agencies.  Office for the co-ordination of Humanitarian Affair (OCHA)  World Health Organization (WHO)  UNICEF  World Food Programme (WFP)  Food & Agricultural Organisation (FAD) forewarning of disaster
  • 14. Contd…. E.g.: Non Governmental Organizations Co-Operative American Relief Every where (CARE) International committee of Red cross International committee of Red cross
  • 16. India’s Vulnerability to Disasters 57% land is vulnerable to earthquakes. Of these, 12% is vulnerable to severe earthquakes. 68% land is vulnerable to drought. 12% land is vulnerable to floods. 8% land is vulnerable to cyclones. Apart from natural disasters, some cities in India are also vulnerable to chemical and industrial disasters and man-made disasters.
  • 17. Disaster response Epidemiologic surveillance and disease control  Vaccination Nutrition
  • 18. Rehabilitation phase Water supply Food safety Basic sanitation and personal hygiene Vector control
  • 19. DISASTER-EFFECTS Deaths Disability Increase in communicable disease Psychological problems Food shortage Socioeconomic losses Shortage of drugs and medical supplies. Environmental disruption
  • 20. Lessons Learnt • Be Prepared : Preparedness and Mitigation is bound to yield more effective returns than distributing relief after a disaster. • Create a Culture of Preparedness and Prevention. • Evolve a code of conduct for all stake-holders
  • 21. Disaster Reduction Day NIDM observed "Disaster Reduction Day" on the 12th October Rallies and special lectures were organized in the universities and colleges to mark the initiatives of awareness for disaster reduction amongst youth & children Children's Colour Activity Book for Disaster Preparedness

Editor's Notes

  1. 3
  2. 4
  3. 5
  4. 6
  5. 7
  6. 8
  7. The reasons for this are varied including: an increasing population pressures in urban areas an increase in the extent of encroachment into lands, e.g., river beds or drainage courses, low lying areas etc. poor or ignored zoning laws and policies lack of proper risk management (insurance) In India the primary responsibility for responding to disasters lies at the State level. Many states have yet to prepare Disaster Management Plans. Section 11 of DM Act provides that “There shall be drawn up a plan for Disaster Management for the whole of the Country to be called National Plan.” The National Response Plan to be prepared by an Inter Ministerial Central Team formed by the NEC in the MHA Spanning all the Central Ministries/Departments. The Mitigation and Preparedness Plans The National Human Resource and Capacity Building Plan To be prepared by National Institute of Disaster Management,