SlideShare a Scribd company logo
1 of 26
The University of New Mexico 
Top School in Noida 
© Copyright 1997, The University of New Mexico 
By: 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-2 
Security Fundamentals 
• What is security? 
• Why do I need security? 
• Levels of security 
• Some scenarios 
• Security Policy 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-3 
What is Security? 
• Procedures that protect 
– you, your employees, and your peers 
– Paper or electronic media 
– Hardware, software, and networks 
• Protect from damage, theft, or change 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-4 
What is Security? 
• Protect assets and resources against 
– Human error 
– Intruders from outside 
– Dishonest employees 
– Technical sabotage 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-5 
Why do I Need Security? 
• Typical bank robbery: $9000 
• Typical embezzlement or white collar crime: 
$25,000 
• Typical electronic crime: $650,000 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-6 
Why do I Need Security? 
• Name a company, its been broken into 
• What does this cost a year? (Estimate $5 billion) 
• 17% of US companies had losses due to lack of 
security 
• CERT reports a 77% increase in computer break-ins 
from 1994-1995 
• It is estimated that 85%-97% of computer 
intrusions go undetected School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-7 
Why do I Need Security? 
• Statistics (Who is breaking into you) 
– Current employees 81% 
– Former employees 6% 
– Outsiders 13% 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-8 
Why do I Need Security? 
• Statistics (What are they doing) 
– Alteration of information 12% 
– Theft of service 10% 
– Trespass 2% 
– Money theft 44% 
– Theft of information 16% 
– Damage to software 16% 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-9 
Why do I Need Security? 
• Statistics (Damage to data) 
– Dishonest employees 10% 
– Terrorism 3% 
– Technical sabotage 10% 
– Water 10% 
– Fire 15% 
– Human error 55% 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-10 
Why do I Need Security? 
• The growth of the internet and client/server 
applications has moved more business data onto 
the network. This means more to lose if that data 
is tampered with or stolen. 
• Internetworking is great for data sharing but 
decreases security. 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-11 
Why do I Need Security? 
• Protect yourself from an attack on your account or 
network 
• Protect others from being attacked by your account 
or network 
• Disaster recovery 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-12 
Levels of Security 
• The United States Department of Defense has 
defined 7 levels of computer OS security in a 
document known as the Trusted Computer 
Standards Evaluation Criteria. 
• The levels are used to define different levels of 
protection for hardware, software, and stored 
information. 
• The system is additive - higher ratings include the 
Sfucnhcotoiol.neadlihtyo loef. cthoem levels below.
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-13 
Levels of Security 
• D1 is the lowest form of security available and 
states that the system is untrusted 
• A D1 rating is never awarded because this is 
essentially no security at all 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-14 
Levels of Security 
• C1 is the lowest level of security. 
• The system has file and directory read and write 
controls and authentication through user login. 
However, root is considered an unsecure function 
and auditing (system logging) is not available. 
• Most Unix machines would be classified as C1. 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-15 
Levels of Security 
• C2 features an auditing function to record all 
security-related events and provides stronger 
protection on key system files, such as the 
password file. 
• Most Unix machines have the capability with 
addition of software to become C2 compliant. 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-16 
Levels of Security 
• B1 supports multi-level security, such as secret and 
top secret, and mandatory access control, which 
states that a user cannot change permissions on 
files or directories 
• B2 requires that every object and file be labeled 
according to its security level and that these labels 
change dynamically depending on what is being 
used. 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-17 
Levels of Security 
• B3 extends security levels down into the system 
hardware; for example, terminals can only connect 
through trusted cable paths and specialized system 
hardware to ensure there is no unauthorized access 
• A1 is the highest level of security validated 
through the Orange Book. The design must be 
mathematically verified; all hardware and software 
must have been protected during shipment to 
Spcrehvoeonlt. etadmhpoeleri.ncgo.m
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-18 
Types of Attacks? 
• A fire burned in an office. The fire destroyed all 
software, the computer, and most of the files. The 
office was that of the departmental administrator 
who did grades, budgets, and contract functions. 
• Prevention? 
• What to do? 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-19 
Disaster Recovery Plan 
• Backup policy 
• Steps to be taken when you have a disaster 
• Contact names 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-20 
Disaster Recovery (Backups) 
• Create a backup policy 
• There are 2 reasons to do backups 
– Recovery of accidentally deleted files 
– Disaster recovery 
• Follow your policy and take backups regularly. 
• Verify these backups at some interval. 
• Keep backups off-site 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-21 
Backups 
• Purchase good software and hardware for backups 
• Decide on which data to backup and on what 
interval 
• Get a routine 
– Daily, weekly, and monthly 
– Full and Incremental 
School.edhole.com
The University of New Mexico 
Disaster Recovery (Recovery) 
• What do you do when you have a major disaster? 
• Don’t panic 
• Remember you have good backups 
• Follow your plan (You did write up a plan for this 
© Copyright 1997, The University of New Mexico 
I-22 
right?) 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-23 
Types of Attacks? 
• In an open, well traveled, multi-cubicle office you 
have financial resource access that you must 
transfer to your network departmental computer. 
How do you perform your work on the mainframe, 
Novell and your PC while doing other clerical 
duties that often take you from your desk? 
• Without compromising your data? 
School.edhole.com
The University of New Mexico 
Protection from Theft or Change 
© Copyright 1997, The University of New Mexico 
I-24 
• Risks analysis 
• What are the potential risks? 
• Who wants to see this data? 
• Who wants to change this data? 
• Possible attacks from inside? 
• You must create a security policy! 
School.edhole.com
The University of New Mexico 
Protection from Theft or Change 
© Copyright 1997, The University of New Mexico 
I-25 
• Protect from the public wandering the area 
• Keep good passwords and screen savers with 
passwords 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-26 
Types of Attacks 
• Using commonly accessible hacker tools your 
password is guessed and somebody uses your 
account to then break into another account. 
• Prevention? 
• What to do? 
School.edhole.com

More Related Content

What's hot

Ofer Cohen - areas of expertise
Ofer Cohen - areas of expertiseOfer Cohen - areas of expertise
Ofer Cohen - areas of expertiseOfer JRL Cohen
 
Essential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityEssential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityPrecisely
 
My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015Anwar F.A. Dafa-Alla
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care itDhani Ahmad
 
Technology Presentation - 2/11/2020
Technology Presentation - 2/11/2020Technology Presentation - 2/11/2020
Technology Presentation - 2/11/2020Franklin Matters
 
OTechs Information Security Training Course
OTechs Information Security Training CourseOTechs Information Security Training Course
OTechs Information Security Training CourseOsman Suliman
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityAIS Network
 
cyber security notes
cyber security notescyber security notes
cyber security notesSHIKHAJAIN163
 
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...Tonex
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy Dguest34b014
 

What's hot (17)

Ofer Cohen - areas of expertise
Ofer Cohen - areas of expertiseOfer Cohen - areas of expertise
Ofer Cohen - areas of expertise
 
Essential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityEssential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical Security
 
My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Technology Presentation - 2/11/2020
Technology Presentation - 2/11/2020Technology Presentation - 2/11/2020
Technology Presentation - 2/11/2020
 
OTechs Information Security Training Course
OTechs Information Security Training CourseOTechs Information Security Training Course
OTechs Information Security Training Course
 
Resume - Miller, Christopher
Resume - Miller, ChristopherResume - Miller, Christopher
Resume - Miller, Christopher
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
 
Ahmed emad
Ahmed emadAhmed emad
Ahmed emad
 
cyber security notes
cyber security notescyber security notes
cyber security notes
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 

Similar to Top schools in noida

Network Security introduction.pdf
Network Security introduction.pdfNetwork Security introduction.pdf
Network Security introduction.pdfssuser3e6464
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...Investorideas.com
 
CCNA_Security_01.ppt
CCNA_Security_01.pptCCNA_Security_01.ppt
CCNA_Security_01.pptveracru1
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewali raza
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
CYBER SECURITY 101.pptx
CYBER SECURITY 101.pptxCYBER SECURITY 101.pptx
CYBER SECURITY 101.pptxTejasPathak29
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012RECIPA
 
Chapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxChapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxJhaiJhai6
 
ransome_case solved.pptx
ransome_case solved.pptxransome_case solved.pptx
ransome_case solved.pptxradhika457461
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.pptit160320737038
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 

Similar to Top schools in noida (20)

Network Security introduction.pdf
Network Security introduction.pdfNetwork Security introduction.pdf
Network Security introduction.pdf
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
 
CCNA_Security_01.ppt
CCNA_Security_01.pptCCNA_Security_01.ppt
CCNA_Security_01.ppt
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Information Security Concepts.pdf
Information Security Concepts.pdfInformation Security Concepts.pdf
Information Security Concepts.pdf
 
CYBER SECURITY 101.pptx
CYBER SECURITY 101.pptxCYBER SECURITY 101.pptx
CYBER SECURITY 101.pptx
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
Chapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxChapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptx
 
ransome_case solved.pptx
ransome_case solved.pptxransome_case solved.pptx
ransome_case solved.pptx
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 

More from Edhole.com

Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarkaEdhole.com
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarkaEdhole.com
 
Website development company surat
Website development company suratWebsite development company surat
Website development company suratEdhole.com
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in suratEdhole.com
 
Website dsigning company in india
Website dsigning company in indiaWebsite dsigning company in india
Website dsigning company in indiaEdhole.com
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhiEdhole.com
 
Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarkaEdhole.com
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarkaEdhole.com
 
Website development company surat
Website development company suratWebsite development company surat
Website development company suratEdhole.com
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in suratEdhole.com
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in indiaEdhole.com
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhiEdhole.com
 
Website designing company in mumbai
Website designing company in mumbaiWebsite designing company in mumbai
Website designing company in mumbaiEdhole.com
 
Website development company surat
Website development company suratWebsite development company surat
Website development company suratEdhole.com
 
Website desinging company in surat
Website desinging company in suratWebsite desinging company in surat
Website desinging company in suratEdhole.com
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in indiaEdhole.com
 

More from Edhole.com (20)

Ca in patna
Ca in patnaCa in patna
Ca in patna
 
Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarka
 
Ca in dwarka
Ca in dwarkaCa in dwarka
Ca in dwarka
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarka
 
Website development company surat
Website development company suratWebsite development company surat
Website development company surat
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in surat
 
Website dsigning company in india
Website dsigning company in indiaWebsite dsigning company in india
Website dsigning company in india
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhi
 
Ca in patna
Ca in patnaCa in patna
Ca in patna
 
Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarka
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarka
 
Ca in dwarka
Ca in dwarkaCa in dwarka
Ca in dwarka
 
Website development company surat
Website development company suratWebsite development company surat
Website development company surat
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in surat
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in india
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhi
 
Website designing company in mumbai
Website designing company in mumbaiWebsite designing company in mumbai
Website designing company in mumbai
 
Website development company surat
Website development company suratWebsite development company surat
Website development company surat
 
Website desinging company in surat
Website desinging company in suratWebsite desinging company in surat
Website desinging company in surat
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in india
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Top schools in noida

  • 1. The University of New Mexico Top School in Noida © Copyright 1997, The University of New Mexico By: School.edhole.com
  • 2. The University of New Mexico © Copyright 1997, The University of New Mexico I-2 Security Fundamentals • What is security? • Why do I need security? • Levels of security • Some scenarios • Security Policy School.edhole.com
  • 3. The University of New Mexico © Copyright 1997, The University of New Mexico I-3 What is Security? • Procedures that protect – you, your employees, and your peers – Paper or electronic media – Hardware, software, and networks • Protect from damage, theft, or change School.edhole.com
  • 4. The University of New Mexico © Copyright 1997, The University of New Mexico I-4 What is Security? • Protect assets and resources against – Human error – Intruders from outside – Dishonest employees – Technical sabotage School.edhole.com
  • 5. The University of New Mexico © Copyright 1997, The University of New Mexico I-5 Why do I Need Security? • Typical bank robbery: $9000 • Typical embezzlement or white collar crime: $25,000 • Typical electronic crime: $650,000 School.edhole.com
  • 6. The University of New Mexico © Copyright 1997, The University of New Mexico I-6 Why do I Need Security? • Name a company, its been broken into • What does this cost a year? (Estimate $5 billion) • 17% of US companies had losses due to lack of security • CERT reports a 77% increase in computer break-ins from 1994-1995 • It is estimated that 85%-97% of computer intrusions go undetected School.edhole.com
  • 7. The University of New Mexico © Copyright 1997, The University of New Mexico I-7 Why do I Need Security? • Statistics (Who is breaking into you) – Current employees 81% – Former employees 6% – Outsiders 13% School.edhole.com
  • 8. The University of New Mexico © Copyright 1997, The University of New Mexico I-8 Why do I Need Security? • Statistics (What are they doing) – Alteration of information 12% – Theft of service 10% – Trespass 2% – Money theft 44% – Theft of information 16% – Damage to software 16% School.edhole.com
  • 9. The University of New Mexico © Copyright 1997, The University of New Mexico I-9 Why do I Need Security? • Statistics (Damage to data) – Dishonest employees 10% – Terrorism 3% – Technical sabotage 10% – Water 10% – Fire 15% – Human error 55% School.edhole.com
  • 10. The University of New Mexico © Copyright 1997, The University of New Mexico I-10 Why do I Need Security? • The growth of the internet and client/server applications has moved more business data onto the network. This means more to lose if that data is tampered with or stolen. • Internetworking is great for data sharing but decreases security. School.edhole.com
  • 11. The University of New Mexico © Copyright 1997, The University of New Mexico I-11 Why do I Need Security? • Protect yourself from an attack on your account or network • Protect others from being attacked by your account or network • Disaster recovery School.edhole.com
  • 12. The University of New Mexico © Copyright 1997, The University of New Mexico I-12 Levels of Security • The United States Department of Defense has defined 7 levels of computer OS security in a document known as the Trusted Computer Standards Evaluation Criteria. • The levels are used to define different levels of protection for hardware, software, and stored information. • The system is additive - higher ratings include the Sfucnhcotoiol.neadlihtyo loef. cthoem levels below.
  • 13. The University of New Mexico © Copyright 1997, The University of New Mexico I-13 Levels of Security • D1 is the lowest form of security available and states that the system is untrusted • A D1 rating is never awarded because this is essentially no security at all School.edhole.com
  • 14. The University of New Mexico © Copyright 1997, The University of New Mexico I-14 Levels of Security • C1 is the lowest level of security. • The system has file and directory read and write controls and authentication through user login. However, root is considered an unsecure function and auditing (system logging) is not available. • Most Unix machines would be classified as C1. School.edhole.com
  • 15. The University of New Mexico © Copyright 1997, The University of New Mexico I-15 Levels of Security • C2 features an auditing function to record all security-related events and provides stronger protection on key system files, such as the password file. • Most Unix machines have the capability with addition of software to become C2 compliant. School.edhole.com
  • 16. The University of New Mexico © Copyright 1997, The University of New Mexico I-16 Levels of Security • B1 supports multi-level security, such as secret and top secret, and mandatory access control, which states that a user cannot change permissions on files or directories • B2 requires that every object and file be labeled according to its security level and that these labels change dynamically depending on what is being used. School.edhole.com
  • 17. The University of New Mexico © Copyright 1997, The University of New Mexico I-17 Levels of Security • B3 extends security levels down into the system hardware; for example, terminals can only connect through trusted cable paths and specialized system hardware to ensure there is no unauthorized access • A1 is the highest level of security validated through the Orange Book. The design must be mathematically verified; all hardware and software must have been protected during shipment to Spcrehvoeonlt. etadmhpoeleri.ncgo.m
  • 18. The University of New Mexico © Copyright 1997, The University of New Mexico I-18 Types of Attacks? • A fire burned in an office. The fire destroyed all software, the computer, and most of the files. The office was that of the departmental administrator who did grades, budgets, and contract functions. • Prevention? • What to do? School.edhole.com
  • 19. The University of New Mexico © Copyright 1997, The University of New Mexico I-19 Disaster Recovery Plan • Backup policy • Steps to be taken when you have a disaster • Contact names School.edhole.com
  • 20. The University of New Mexico © Copyright 1997, The University of New Mexico I-20 Disaster Recovery (Backups) • Create a backup policy • There are 2 reasons to do backups – Recovery of accidentally deleted files – Disaster recovery • Follow your policy and take backups regularly. • Verify these backups at some interval. • Keep backups off-site School.edhole.com
  • 21. The University of New Mexico © Copyright 1997, The University of New Mexico I-21 Backups • Purchase good software and hardware for backups • Decide on which data to backup and on what interval • Get a routine – Daily, weekly, and monthly – Full and Incremental School.edhole.com
  • 22. The University of New Mexico Disaster Recovery (Recovery) • What do you do when you have a major disaster? • Don’t panic • Remember you have good backups • Follow your plan (You did write up a plan for this © Copyright 1997, The University of New Mexico I-22 right?) School.edhole.com
  • 23. The University of New Mexico © Copyright 1997, The University of New Mexico I-23 Types of Attacks? • In an open, well traveled, multi-cubicle office you have financial resource access that you must transfer to your network departmental computer. How do you perform your work on the mainframe, Novell and your PC while doing other clerical duties that often take you from your desk? • Without compromising your data? School.edhole.com
  • 24. The University of New Mexico Protection from Theft or Change © Copyright 1997, The University of New Mexico I-24 • Risks analysis • What are the potential risks? • Who wants to see this data? • Who wants to change this data? • Possible attacks from inside? • You must create a security policy! School.edhole.com
  • 25. The University of New Mexico Protection from Theft or Change © Copyright 1997, The University of New Mexico I-25 • Protect from the public wandering the area • Keep good passwords and screen savers with passwords School.edhole.com
  • 26. The University of New Mexico © Copyright 1997, The University of New Mexico I-26 Types of Attacks • Using commonly accessible hacker tools your password is guessed and somebody uses your account to then break into another account. • Prevention? • What to do? School.edhole.com