Group Members :
 Sebina Sebastian (P-40)
 Ashish Mathew (P-07)
 Tushar Pahurkar (P-48)
 Samiksha Thanekar (P-37)
 Ish...
What is Security?
Is the protection of assets. The three main aspects are:
•

Prevention

•

Detection

•

Re-action
Computer Security:
It deals with the prevention and detection of
unauthorised actions by users of a computer
system.
Information Security
 It is more than just protecting hardware and

software from being crashed
 It’s about protecting t...
Risk
Risks and Threats
 Fraud
o Computer manipulation
o Damage or modification of computer data
 Service interruptions and

d...
Risks and Threats
 Denial of service attacks

o Flood attack
o Ping attack
o SYN attack
o Teardrop attack

o Smurf attack...
Risks and Threats
• Malicious software
o Trojan horse
o Worms

o Boot sector virus
• Web site defacements
Risks and Threats
 Extortion

 Sniffing
Risks and Threats
 Spoofing
Risks and Threats
 Con artists
 Phishing or Fishing
COMPUTER CRIMINALS
 Hacker
 Script kiddies
 Cyber-criminals
 Organized crime
COMPUTER CRIMINALS
 Terrorists

 Insiders
CIA triad
 Internal Controls
 Physical


Technical



Administrative
Technical Countermeasures
 Firewalls:
 Encryption/decryption
•

Virtual Private Networks (VPNs)
• Backup
Security’s Five Pillars

Non-repudiation

Integrity

Privacy

Identification

Authentication`
 Authentication
 Identification

 Privacy
 Integrity
 Non-repudiation
Conclusion
Security & Privacy of Information Technology
Security & Privacy of Information Technology
Upcoming SlideShare
Loading in …5
×

Security & Privacy of Information Technology

608 views

Published on

It will give you all a good insight of how the security and privacy is handled.

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
608
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
21
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Security & Privacy of Information Technology

  1. 1. Group Members :  Sebina Sebastian (P-40)  Ashish Mathew (P-07)  Tushar Pahurkar (P-48)  Samiksha Thanekar (P-37)  Ishan Mahadik (P-11)
  2. 2. What is Security? Is the protection of assets. The three main aspects are: • Prevention • Detection • Re-action
  3. 3. Computer Security: It deals with the prevention and detection of unauthorised actions by users of a computer system.
  4. 4. Information Security  It is more than just protecting hardware and software from being crashed  It’s about protecting the information resources that keep the company operating  Goals are to ensure:  Data integrity, availability and confidentiality  Business continuity
  5. 5. Risk
  6. 6. Risks and Threats  Fraud o Computer manipulation o Damage or modification of computer data  Service interruptions and delays  Intrusions  Information manipulation
  7. 7. Risks and Threats  Denial of service attacks o Flood attack o Ping attack o SYN attack o Teardrop attack o Smurf attack  Error  Information theft
  8. 8. Risks and Threats • Malicious software o Trojan horse o Worms o Boot sector virus • Web site defacements
  9. 9. Risks and Threats  Extortion  Sniffing
  10. 10. Risks and Threats  Spoofing
  11. 11. Risks and Threats  Con artists  Phishing or Fishing
  12. 12. COMPUTER CRIMINALS  Hacker  Script kiddies  Cyber-criminals  Organized crime
  13. 13. COMPUTER CRIMINALS  Terrorists  Insiders
  14. 14. CIA triad
  15. 15.  Internal Controls  Physical  Technical  Administrative
  16. 16. Technical Countermeasures  Firewalls:
  17. 17.  Encryption/decryption
  18. 18. • Virtual Private Networks (VPNs)
  19. 19. • Backup
  20. 20. Security’s Five Pillars Non-repudiation Integrity Privacy Identification Authentication`
  21. 21.  Authentication  Identification  Privacy
  22. 22.  Integrity  Non-repudiation
  23. 23. Conclusion

×