SlideShare a Scribd company logo
1 of 13
MANAGING I.T SECURITY
By George Smith-Moore
WHAT WILL BE INCLUDED?
Different security measures for protecting data. I will also evaluate the different access control
methods for protecting I.T systems.
Sources:
http://ico.org.uk/for_organisations/data_protection/security_measures
http://oreilly.com/catalog/csb/chapter/ch03.html
https://sites.google.com/site/jimmyxu101/concepts/accesscontrol
WAYSTO PROTECT AN I.T SYSTEM
 Installing a firewall can block out hackers, whereas an anti-virus system can get rid
of those on your system, already.
 This, if kept up-to-date is an effective means of overall system security, from the
outside world.
 Unfortunately it cannot protect you against, internal theft from within the
business, for protection against this, a different security measure would have to
be put in place.
 Most anti-virus software also includes spyware removal, this would make sure no
hackers can unwittingly gather your, or your customers data.
WAYSTO PROTECT AN I.T SYSTEM
 Keeping software, which includes your OS, and internet browser, up-to-date.This
should fix any known bugs, and security flaws, which hackers may take advantage
of.
WAYSTO PROTECT AN I.T SYSTEM
 Only allowing staff access to the resources needed.
 This would minimise internal sabotage and theft, as the only data accessible is
that which is required for their job.
 Although this protects data to some extent, other ways, which include physically
sealing ports shut, but more on this is explained later.
WAYSTO PROTECT AN I.T SYSTEM
 If data has to be transferred, encrypt it!
 Using encryption helps prevent the use of the data from theft, so if data has to be
transferred via a USB media device, then encrypting the data is vital. It makes
data unreadable until decrypted.
WAYSTO PROTECT AN I.T SYSTEM
 In case of a server failure, have a backup.
 If data is lost, a backup copy that is recent, will render the attack pointless. But
make sure that you have the most recent version, so no data is lost.
WAYSTO PROTECT AN I.T SYSTEM
 Remove media correctly, make sure that all data removed is gone forever, for
instance, programs offer a secure way of deleting files. But another way is to
simply destroy the data at the source, the USB stick, or HDD, etc.
WAYSTO PROTECT AN I.T SYSTEM
 Staff is a big security flaw among businesses.This can be minimised by training
them, and treating them with respect so that they wouldn’t want to steal from
you.
 Staff can be trained to use a strong password, to not become susceptible to social
engineering, and to not be susceptible to spam emails, as these may contain
viruses.
 Physically stealing USB ports on the computers can stop
any unwanted theft, it is a last resort which does work!
ACCESS CONTROL METHODS
 Forcing password changes, and making them of suitable difficulty, with lower and
uppercase letters, numbers and symbols.
 If updated regularly, and being completely different, this can be a very effective
means of protection against hackers.
 This is a simple means of protection, and it should be vital and mandatory for
every business.
ACCESS CONTROL METHODS
 Administrator (Admin user) rights.
 By using the admin functionality (which is on most operating systems),
effectively; you can control and limit what the normal users of the system can and
can’t do.
 A basic example of this, is to stop them changing passwords, and settings; this
prevents potential system sabotage.
 If used in a server effectively, you can limit certain users to certain files, this is
described better on the next slide.
ACCESS CONTROL METHODS
 A server may have one of the two (or both) types of “access controls”.
Discretionary access controls.
Mandatory access controls.
 Discretionary access controls (DAC): It is called discretionary, because it is up to
the discretion of the author, as to whom he gives rites to the file(s). It gives certain
rights to certain users about whom can view and/or edit a document, etc.
 Mandatory access controls (MAC): gives a device a level of security, and only files
that they can access have the same security, it is done through a series of
blacklists and whitelists, it is then used further for each individual user on the
system.
 There aren’t without flaws though, the MAC setup is good for wired networks, but
wireless networks can still be tapped into by hackers, and they can mimic a
validated MAC through the registry (if using windows).
ACCESS CONTROL METHODS
 Using the systems architecture, you can prioritise amounts of RAM, for certain
tasks, “thus isolating privileged processes from non-privileged processes”.
 By doing so you can restrict access to parts of the system.
 Overall, all of the access control methodfs described here, should not be used
alone, and there are flaws to quite a few of them (which are stated where
necessary). For the business, lots of these methods should be used together, to
stop any potential attacks.

More Related Content

What's hot

Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaWikki Verma
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Operating system security
Operating system securityOperating system security
Operating system securitySarmad Makhdoom
 
Tips for Securing Your Workstation
Tips for Securing Your WorkstationTips for Securing Your Workstation
Tips for Securing Your WorkstationBrian Solomon, MBA
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information systemNimisha Walecha
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYRohitK71
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded SystemsMEN Mikro Elektronik GmbH
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them Donald E. Hester
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMfaraz hussain
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 

What's hot (20)

Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
System Security
System SecuritySystem Security
System Security
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki Verma
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
system Security
system Security system Security
system Security
 
Network security
Network securityNetwork security
Network security
 
Computer security
Computer securityComputer security
Computer security
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Operating system security
Operating system securityOperating system security
Operating system security
 
System security
System securitySystem security
System security
 
Security
SecuritySecurity
Security
 
Tips for Securing Your Workstation
Tips for Securing Your WorkstationTips for Securing Your Workstation
Tips for Securing Your Workstation
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 

Viewers also liked

Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breachesOriginalGSM
 
ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1OriginalGSM
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2OriginalGSM
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2OriginalGSM
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2OriginalGSM
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1OriginalGSM
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1OriginalGSM
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1OriginalGSM
 
ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2OriginalGSM
 

Viewers also liked (14)

UNIT 2 M1
UNIT 2 M1UNIT 2 M1
UNIT 2 M1
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breaches
 
UNIT 2 P1
UNIT 2 P1UNIT 2 P1
UNIT 2 P1
 
ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2
 
UNIT 2 P6
UNIT 2 P6UNIT 2 P6
UNIT 2 P6
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
 
UNIT 2 P8
UNIT 2 P8UNIT 2 P8
UNIT 2 P8
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1
 
UNIT 2 P5
UNIT 2 P5UNIT 2 P5
UNIT 2 P5
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
 
ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2
 

Similar to Managing i.t security

Running head Assignment 1 Identifying Potential Malicious Attack.docx
Running head Assignment 1 Identifying Potential Malicious Attack.docxRunning head Assignment 1 Identifying Potential Malicious Attack.docx
Running head Assignment 1 Identifying Potential Malicious Attack.docxsusanschei
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Lana Sorrels
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security ChecklistMobeen Khan
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklistbackdoor
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxbartholomeocoombs
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxannette228280
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxgitagrimston
 
Security has been the number 1 issue for any IT industry and organiz.pdf
Security has been the number 1 issue for any IT industry and organiz.pdfSecurity has been the number 1 issue for any IT industry and organiz.pdf
Security has been the number 1 issue for any IT industry and organiz.pdfanupambedcovers
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 

Similar to Managing i.t security (20)

Running head Assignment 1 Identifying Potential Malicious Attack.docx
Running head Assignment 1 Identifying Potential Malicious Attack.docxRunning head Assignment 1 Identifying Potential Malicious Attack.docx
Running head Assignment 1 Identifying Potential Malicious Attack.docx
 
Is4560
Is4560Is4560
Is4560
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
 
Security has been the number 1 issue for any IT industry and organiz.pdf
Security has been the number 1 issue for any IT industry and organiz.pdfSecurity has been the number 1 issue for any IT industry and organiz.pdf
Security has been the number 1 issue for any IT industry and organiz.pdf
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 

More from OriginalGSM

UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2OriginalGSM
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2OriginalGSM
 
Software preparation
Software preparationSoftware preparation
Software preparationOriginalGSM
 
Personalising desktop
Personalising desktopPersonalising desktop
Personalising desktopOriginalGSM
 
Software licences
Software licencesSoftware licences
Software licencesOriginalGSM
 
Preperation for the installation of computer hardware
Preperation for the installation of computer hardwarePreperation for the installation of computer hardware
Preperation for the installation of computer hardwareOriginalGSM
 
Installation of a selected piece of hardware
Installation of a selected piece of hardwareInstallation of a selected piece of hardware
Installation of a selected piece of hardwareOriginalGSM
 
Problems of installation of hardware
Problems of installation of hardwareProblems of installation of hardware
Problems of installation of hardwareOriginalGSM
 
Installation of OS
Installation of OSInstallation of OS
Installation of OSOriginalGSM
 
Building a computer virtual desktop computer components
Building a computer virtual desktop computer componentsBuilding a computer virtual desktop computer components
Building a computer virtual desktop computer componentsOriginalGSM
 
Installation of wireless NIC software
Installation of wireless NIC softwareInstallation of wireless NIC software
Installation of wireless NIC softwareOriginalGSM
 
Health and safety in the workplace.
Health and safety in the workplace.Health and safety in the workplace.
Health and safety in the workplace.OriginalGSM
 

More from OriginalGSM (16)

UNTI 2 P7
UNTI 2 P7UNTI 2 P7
UNTI 2 P7
 
UNIT 2 P2
UNIT 2 P2UNIT 2 P2
UNIT 2 P2
 
UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2
 
Security plan
Security planSecurity plan
Security plan
 
Software preparation
Software preparationSoftware preparation
Software preparation
 
Personalising desktop
Personalising desktopPersonalising desktop
Personalising desktop
 
Software licences
Software licencesSoftware licences
Software licences
 
Preperation for the installation of computer hardware
Preperation for the installation of computer hardwarePreperation for the installation of computer hardware
Preperation for the installation of computer hardware
 
Installation of a selected piece of hardware
Installation of a selected piece of hardwareInstallation of a selected piece of hardware
Installation of a selected piece of hardware
 
Problems of installation of hardware
Problems of installation of hardwareProblems of installation of hardware
Problems of installation of hardware
 
Installation of OS
Installation of OSInstallation of OS
Installation of OS
 
Building a computer virtual desktop computer components
Building a computer virtual desktop computer componentsBuilding a computer virtual desktop computer components
Building a computer virtual desktop computer components
 
Installation of wireless NIC software
Installation of wireless NIC softwareInstallation of wireless NIC software
Installation of wireless NIC software
 
OS comparison
OS comparisonOS comparison
OS comparison
 
Health and safety in the workplace.
Health and safety in the workplace.Health and safety in the workplace.
Health and safety in the workplace.
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Managing i.t security

  • 1. MANAGING I.T SECURITY By George Smith-Moore
  • 2. WHAT WILL BE INCLUDED? Different security measures for protecting data. I will also evaluate the different access control methods for protecting I.T systems. Sources: http://ico.org.uk/for_organisations/data_protection/security_measures http://oreilly.com/catalog/csb/chapter/ch03.html https://sites.google.com/site/jimmyxu101/concepts/accesscontrol
  • 3. WAYSTO PROTECT AN I.T SYSTEM  Installing a firewall can block out hackers, whereas an anti-virus system can get rid of those on your system, already.  This, if kept up-to-date is an effective means of overall system security, from the outside world.  Unfortunately it cannot protect you against, internal theft from within the business, for protection against this, a different security measure would have to be put in place.  Most anti-virus software also includes spyware removal, this would make sure no hackers can unwittingly gather your, or your customers data.
  • 4. WAYSTO PROTECT AN I.T SYSTEM  Keeping software, which includes your OS, and internet browser, up-to-date.This should fix any known bugs, and security flaws, which hackers may take advantage of.
  • 5. WAYSTO PROTECT AN I.T SYSTEM  Only allowing staff access to the resources needed.  This would minimise internal sabotage and theft, as the only data accessible is that which is required for their job.  Although this protects data to some extent, other ways, which include physically sealing ports shut, but more on this is explained later.
  • 6. WAYSTO PROTECT AN I.T SYSTEM  If data has to be transferred, encrypt it!  Using encryption helps prevent the use of the data from theft, so if data has to be transferred via a USB media device, then encrypting the data is vital. It makes data unreadable until decrypted.
  • 7. WAYSTO PROTECT AN I.T SYSTEM  In case of a server failure, have a backup.  If data is lost, a backup copy that is recent, will render the attack pointless. But make sure that you have the most recent version, so no data is lost.
  • 8. WAYSTO PROTECT AN I.T SYSTEM  Remove media correctly, make sure that all data removed is gone forever, for instance, programs offer a secure way of deleting files. But another way is to simply destroy the data at the source, the USB stick, or HDD, etc.
  • 9. WAYSTO PROTECT AN I.T SYSTEM  Staff is a big security flaw among businesses.This can be minimised by training them, and treating them with respect so that they wouldn’t want to steal from you.  Staff can be trained to use a strong password, to not become susceptible to social engineering, and to not be susceptible to spam emails, as these may contain viruses.  Physically stealing USB ports on the computers can stop any unwanted theft, it is a last resort which does work!
  • 10. ACCESS CONTROL METHODS  Forcing password changes, and making them of suitable difficulty, with lower and uppercase letters, numbers and symbols.  If updated regularly, and being completely different, this can be a very effective means of protection against hackers.  This is a simple means of protection, and it should be vital and mandatory for every business.
  • 11. ACCESS CONTROL METHODS  Administrator (Admin user) rights.  By using the admin functionality (which is on most operating systems), effectively; you can control and limit what the normal users of the system can and can’t do.  A basic example of this, is to stop them changing passwords, and settings; this prevents potential system sabotage.  If used in a server effectively, you can limit certain users to certain files, this is described better on the next slide.
  • 12. ACCESS CONTROL METHODS  A server may have one of the two (or both) types of “access controls”. Discretionary access controls. Mandatory access controls.  Discretionary access controls (DAC): It is called discretionary, because it is up to the discretion of the author, as to whom he gives rites to the file(s). It gives certain rights to certain users about whom can view and/or edit a document, etc.  Mandatory access controls (MAC): gives a device a level of security, and only files that they can access have the same security, it is done through a series of blacklists and whitelists, it is then used further for each individual user on the system.  There aren’t without flaws though, the MAC setup is good for wired networks, but wireless networks can still be tapped into by hackers, and they can mimic a validated MAC through the registry (if using windows).
  • 13. ACCESS CONTROL METHODS  Using the systems architecture, you can prioritise amounts of RAM, for certain tasks, “thus isolating privileged processes from non-privileged processes”.  By doing so you can restrict access to parts of the system.  Overall, all of the access control methodfs described here, should not be used alone, and there are flaws to quite a few of them (which are stated where necessary). For the business, lots of these methods should be used together, to stop any potential attacks.