Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
It security
1. IT SECURITY
Corporate and Government agencies need to
PowerPlugs
proactively protect their critical applications, data
and processes from external and internal threats
throughout their entire life cycle. By taking a
comprehensive and integrated approach to
application vulnerability management, agencies
can measurably improve operational security,
mitigate risks,PowerPoint costs.
Templates for and reduce
2. IT SECURITY
A recent study indicates that over 93%
PowerPlugs
of information produced is in digital format.
The same study also noted that 85% of all
criminal, civil, and company violations are
done by means of digital Intrusion.
Templates for PowerPoint
3. POSSIBILITY OF BREACH OF IT SECURITY
• Theft of Company Secrets (client or employee lists)
• Employee Sabotage or Terrorism
PowerPlugs
• Credit Card Fraud
• Financial Crimes
• Embezzlement (money or information)
• Economic Crimes
• Harassment (sexual)
• Child Pornography
• Major Crimes
•Templates for (short or long-term plans)
Identity Theft PowerPoint
4. Nature of Attacks
Internal External
PowerPlugs
USB LAN Web
PEN Drives Mail
Templates for PowerPoint
IM
External Hard Drives
5. INTERNAL INTRUSION
Pen Drive Intrusion
PowerPlugs
o Details of all pen drives installed on a system
o Recorded as per O/S artifacts with timeline
o Analysis of all pen drives used on different work station on a Network
Local Area Network Intrusion
o Any suspected user Login Analysis with Victims computer in the Network
o Artifacts
Templates with regard to different incidents taken place during that log on period
for PowerPoint
6. EXTERNAL INTRUSION
1. Web Intrusion
Trojan
Malware
PowerPlugs
Spyware
2. Mails
As an Attachment
3. IM
Templates for PowerPoint
During communication
Attachment
7. NEED OF IT SECURITY
IT Security is now PowerPlugs
a basic requirement because
global computing is inherently insecure.
Information Security means protecting
information from unauthorized access.
Information security is a continue process to
protect your information.
Templates for PowerPoint
8. IT SECURITY
CIA Triangle
• Confidentiality
• Integrity PowerPlugs
• Availability
Confidentiality
Ensuring that your information remains confidential and
remains with only to those who should access that information.
Information Integrity
Templates for PowerPoint able to change your information,
Knowing that no one has been
so you can depend on its accuracy.
Availability
Making sure that your information is available when you need it.
9. IT INFRASTRUCTURE
• Servers
PowerPlugs
• Routers
• Firewall
• Network
• Web
Templates for PowerPoint
• Users
10. OUR PROCESS MODEL
First Phase
Identification of Targets
System Fingerprinting, Enumeration, Checking the Information Flow
Second Phase PowerPlugs
Identification of Vulnerabilities and Potential Risks
Non Destructive Exploitation of found Vulnerabilities
Third Phase
Result Collation and Report Writing
Giving the Final Report to the Client about total health of I T
Infrastructure.
Fourth Phase
Templates for for smooth & secure IT environment and Business
Suggestions PowerPoint
continuity.
Recommendation of Industry Best Solutions to maintain secure
environment to deal with future Threats and Challenges.