SlideShare a Scribd company logo
1 of 11
IT SECURITY

Corporate and Government agencies need to
                  PowerPlugs
proactively protect their critical applications, data
and processes from external and internal threats
throughout their entire life cycle. By taking a
comprehensive and integrated approach to
application vulnerability management, agencies
can measurably improve operational security,
mitigate risks,PowerPoint costs.
 Templates for and reduce
IT SECURITY

   A recent study indicates that over 93%
                 PowerPlugs
of information produced is in digital format.
The same study also noted that 85% of all
criminal, civil, and company violations are
done by means of digital Intrusion.
Templates for PowerPoint
POSSIBILITY OF BREACH OF IT SECURITY


•  Theft of Company Secrets (client or employee lists)
• Employee Sabotage or Terrorism
                     PowerPlugs
• Credit Card Fraud
• Financial Crimes
• Embezzlement (money or information)
• Economic Crimes
• Harassment (sexual)
• Child Pornography
• Major Crimes
•Templates for (short or long-term plans)
   Identity Theft PowerPoint
Nature of Attacks

              Internal        External
                   PowerPlugs

       USB                LAN       Web



             PEN Drives             Mail


Templates for PowerPoint
                                    IM
             External Hard Drives
INTERNAL INTRUSION
Pen Drive Intrusion

                            PowerPlugs
    o Details of all pen drives installed on a system
    o Recorded as per O/S artifacts with timeline
    o Analysis of all pen drives used on different work station on a Network


Local Area Network Intrusion
    o Any suspected user Login Analysis with Victims computer in the Network
  o Artifacts
Templates with regard to different incidents taken place during that log on period
              for PowerPoint
EXTERNAL INTRUSION
     1. Web Intrusion
             Trojan
             Malware
                    PowerPlugs
             Spyware

     2. Mails
             As an Attachment

     3. IM
Templates for PowerPoint
             During communication
             Attachment
NEED OF IT SECURITY

IT Security is now PowerPlugs
                   a basic requirement because
global computing is inherently insecure.
Information     Security    means     protecting
information     from     unauthorized   access.
Information security is a continue process to
protect your information.

Templates for PowerPoint
IT SECURITY
CIA Triangle

       • Confidentiality
       • Integrity         PowerPlugs
       • Availability


Confidentiality
      Ensuring that your information remains confidential and
       remains with only to those who should access that information.

Information Integrity
 Templates for PowerPoint able to change your information,
       Knowing that no one has been
        so you can depend on its accuracy.

Availability
       Making sure that your information is available when you need it.
IT INFRASTRUCTURE

  • Servers
                 PowerPlugs
  • Routers

  • Firewall

  • Network

  • Web
Templates for PowerPoint
  • Users
OUR PROCESS MODEL
First Phase
         Identification of Targets
         System Fingerprinting, Enumeration, Checking the Information Flow

Second Phase                  PowerPlugs
       Identification of Vulnerabilities and Potential Risks
       Non Destructive Exploitation of found Vulnerabilities

Third Phase
        Result Collation and Report Writing
        Giving the Final Report to the Client about total health of I T
        Infrastructure.

Fourth Phase
 Templates for for smooth & secure IT environment and Business
       Suggestions PowerPoint
       continuity.
       Recommendation of Industry Best Solutions to maintain secure
       environment to deal with future Threats and Challenges.
PowerPlugs

           THANK YOU

Templates for PowerPoint

More Related Content

What's hot

Internal host-reputation-webinar
Internal host-reputation-webinarInternal host-reputation-webinar
Internal host-reputation-webinarLancope, Inc.
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 
Information security
Information securityInformation security
Information securitylinalona515
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesomriyad
 
PhD-Guidance-in-Security
PhD-Guidance-in-SecurityPhD-Guidance-in-Security
PhD-Guidance-in-SecurityPhdtopiccom
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Arun Velayudhan
 
Computer Security
Computer SecurityComputer Security
Computer SecurityAkNirojan
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationhamzakareem2
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-CommerceHem Pokhrel
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
IoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - LyleIoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - Lylewebinos project
 
Competitive cyber security
Competitive cyber securityCompetitive cyber security
Competitive cyber securityWilliam Mathews
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular usersGeoffrey Vaughan
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011Xavier Mertens
 
Introduction to hacking
Introduction to hackingIntroduction to hacking
Introduction to hackingnitish mehta
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
The importance of antivirus software
The importance of antivirus softwareThe importance of antivirus software
The importance of antivirus softwaresamthking25
 

What's hot (20)

Internal host-reputation-webinar
Internal host-reputation-webinarInternal host-reputation-webinar
Internal host-reputation-webinar
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Information security
Information securityInformation security
Information security
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
 
Information security
Information securityInformation security
Information security
 
PhD-Guidance-in-Security
PhD-Guidance-in-SecurityPhD-Guidance-in-Security
PhD-Guidance-in-Security
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
IoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - LyleIoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - Lyle
 
Competitive cyber security
Competitive cyber securityCompetitive cyber security
Competitive cyber security
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 
Introduction to hacking
Introduction to hackingIntroduction to hacking
Introduction to hacking
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
The importance of antivirus software
The importance of antivirus softwareThe importance of antivirus software
The importance of antivirus software
 

Viewers also liked

Android app developers australia
Android app developers australiaAndroid app developers australia
Android app developers australiaaravindcalpine
 
Evaluacin 1225044837613098-9
Evaluacin 1225044837613098-9Evaluacin 1225044837613098-9
Evaluacin 1225044837613098-9Jorgito Mac
 
Materi pengayaan un bahasa inggris smp m ts 2014
Materi pengayaan un bahasa inggris smp m ts 2014Materi pengayaan un bahasa inggris smp m ts 2014
Materi pengayaan un bahasa inggris smp m ts 2014Nabila Dwi
 
Atps matemática aplicada
Atps matemática aplicadaAtps matemática aplicada
Atps matemática aplicadaSIMONE GOUVEA
 
5 steps for rebuilding a struggling club
5 steps for rebuilding a struggling club5 steps for rebuilding a struggling club
5 steps for rebuilding a struggling clubrobinriddell
 
1 comenius project belgium
1 comenius project belgium1 comenius project belgium
1 comenius project belgiumCanan Taş
 
Estamos preparados para el cambio
Estamos preparados para el cambioEstamos preparados para el cambio
Estamos preparados para el cambioPatricia3695
 
Peu para discusión preliminar 1
Peu para discusión preliminar 1Peu para discusión preliminar 1
Peu para discusión preliminar 1Programa Usco
 
Perception des marques en conversation
Perception des marques en conversationPerception des marques en conversation
Perception des marques en conversationAndria Andriuzzi
 
Apresentação Danoninho
Apresentação DanoninhoApresentação Danoninho
Apresentação DanoninhoVanessa Fontes
 

Viewers also liked (17)

Android app developers australia
Android app developers australiaAndroid app developers australia
Android app developers australia
 
Evaluacin 1225044837613098-9
Evaluacin 1225044837613098-9Evaluacin 1225044837613098-9
Evaluacin 1225044837613098-9
 
Materi pengayaan un bahasa inggris smp m ts 2014
Materi pengayaan un bahasa inggris smp m ts 2014Materi pengayaan un bahasa inggris smp m ts 2014
Materi pengayaan un bahasa inggris smp m ts 2014
 
Atps matemática aplicada
Atps matemática aplicadaAtps matemática aplicada
Atps matemática aplicada
 
Masopust in szkoła podstawowa
Masopust in szkoła podstawowaMasopust in szkoła podstawowa
Masopust in szkoła podstawowa
 
Atps economia
Atps economiaAtps economia
Atps economia
 
5 steps for rebuilding a struggling club
5 steps for rebuilding a struggling club5 steps for rebuilding a struggling club
5 steps for rebuilding a struggling club
 
1 comenius project belgium
1 comenius project belgium1 comenius project belgium
1 comenius project belgium
 
Mat 2 a
Mat 2 aMat 2 a
Mat 2 a
 
Estamos preparados para el cambio
Estamos preparados para el cambioEstamos preparados para el cambio
Estamos preparados para el cambio
 
Edital Concurso ANTAQ 2014
Edital Concurso ANTAQ 2014Edital Concurso ANTAQ 2014
Edital Concurso ANTAQ 2014
 
Peu para discusión preliminar 1
Peu para discusión preliminar 1Peu para discusión preliminar 1
Peu para discusión preliminar 1
 
Vicraelpineda
VicraelpinedaVicraelpineda
Vicraelpineda
 
Perception des marques en conversation
Perception des marques en conversationPerception des marques en conversation
Perception des marques en conversation
 
Retail career
Retail careerRetail career
Retail career
 
Proposiciones
ProposicionesProposiciones
Proposiciones
 
Apresentação Danoninho
Apresentação DanoninhoApresentação Danoninho
Apresentação Danoninho
 

Similar to It security

Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...BAINIDA
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...adeel hamid
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipRedZone Technologies
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterVeriato
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testingCu Nguyen
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cCharles Li
 
How to secure and manage modern IT - Ondrej Vysek
 How to secure and manage modern IT - Ondrej Vysek How to secure and manage modern IT - Ondrej Vysek
How to secure and manage modern IT - Ondrej VysekITCamp
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskBeyondTrust
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecTrupti Shiralkar, CISSP
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet AyushJadon5
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on CloudTu Pham
 
As a newly appointed network administrator, you have been requested .docx
As a newly appointed network administrator, you have been requested .docxAs a newly appointed network administrator, you have been requested .docx
As a newly appointed network administrator, you have been requested .docxmammiesfa
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Amazon Web Services
 

Similar to It security (20)

Securitarian
SecuritarianSecuritarian
Securitarian
 
Securitarian
SecuritarianSecuritarian
Securitarian
 
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testing
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
How to secure and manage modern IT - Ondrej Vysek
 How to secure and manage modern IT - Ondrej Vysek How to secure and manage modern IT - Ondrej Vysek
How to secure and manage modern IT - Ondrej Vysek
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
As a newly appointed network administrator, you have been requested .docx
As a newly appointed network administrator, you have been requested .docxAs a newly appointed network administrator, you have been requested .docx
As a newly appointed network administrator, you have been requested .docx
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
 

It security

  • 1. IT SECURITY Corporate and Government agencies need to PowerPlugs proactively protect their critical applications, data and processes from external and internal threats throughout their entire life cycle. By taking a comprehensive and integrated approach to application vulnerability management, agencies can measurably improve operational security, mitigate risks,PowerPoint costs. Templates for and reduce
  • 2. IT SECURITY A recent study indicates that over 93% PowerPlugs of information produced is in digital format. The same study also noted that 85% of all criminal, civil, and company violations are done by means of digital Intrusion. Templates for PowerPoint
  • 3. POSSIBILITY OF BREACH OF IT SECURITY • Theft of Company Secrets (client or employee lists) • Employee Sabotage or Terrorism PowerPlugs • Credit Card Fraud • Financial Crimes • Embezzlement (money or information) • Economic Crimes • Harassment (sexual) • Child Pornography • Major Crimes •Templates for (short or long-term plans) Identity Theft PowerPoint
  • 4. Nature of Attacks Internal External PowerPlugs USB LAN Web PEN Drives Mail Templates for PowerPoint IM External Hard Drives
  • 5. INTERNAL INTRUSION Pen Drive Intrusion PowerPlugs o Details of all pen drives installed on a system o Recorded as per O/S artifacts with timeline o Analysis of all pen drives used on different work station on a Network Local Area Network Intrusion o Any suspected user Login Analysis with Victims computer in the Network o Artifacts Templates with regard to different incidents taken place during that log on period for PowerPoint
  • 6. EXTERNAL INTRUSION 1. Web Intrusion Trojan Malware PowerPlugs Spyware 2. Mails As an Attachment 3. IM Templates for PowerPoint During communication Attachment
  • 7. NEED OF IT SECURITY IT Security is now PowerPlugs a basic requirement because global computing is inherently insecure. Information Security means protecting information from unauthorized access. Information security is a continue process to protect your information. Templates for PowerPoint
  • 8. IT SECURITY CIA Triangle • Confidentiality • Integrity PowerPlugs • Availability Confidentiality Ensuring that your information remains confidential and remains with only to those who should access that information. Information Integrity Templates for PowerPoint able to change your information, Knowing that no one has been so you can depend on its accuracy. Availability Making sure that your information is available when you need it.
  • 9. IT INFRASTRUCTURE • Servers PowerPlugs • Routers • Firewall • Network • Web Templates for PowerPoint • Users
  • 10. OUR PROCESS MODEL First Phase Identification of Targets System Fingerprinting, Enumeration, Checking the Information Flow Second Phase PowerPlugs Identification of Vulnerabilities and Potential Risks Non Destructive Exploitation of found Vulnerabilities Third Phase Result Collation and Report Writing Giving the Final Report to the Client about total health of I T Infrastructure. Fourth Phase Templates for for smooth & secure IT environment and Business Suggestions PowerPoint continuity. Recommendation of Industry Best Solutions to maintain secure environment to deal with future Threats and Challenges.
  • 11. PowerPlugs THANK YOU Templates for PowerPoint