Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Ways to secure IT Systems Presented by: Francis Guison OOA
Importance <ul><li>Information and the systems that process are a critical resource for an organization, indeed it is a fu...
Threats <ul><li>Spam </li></ul><ul><li>Phishing attacks </li></ul><ul><li>Spyware </li></ul><ul><li>Ineffective Firewall <...
Solution - Ways to Secure <ul><li>When developing a security management plan, an excellent place to start is to  conduct a...
<ul><li>subscribe to one of the numerous security journals, web sites and mailing lists.  </li></ul>
Needs <ul><li>Cost-effective security  </li></ul><ul><li>Privacy of sensitive unclassified information in Federal computer...
Security Softwares <ul><li>Secure Information Courier </li></ul><ul><li>  1 Click & Lock  </li></ul><ul><li>  FOX Password...
Sources: <ul><li>http://www.ameinfo.com/48826.html </li></ul><ul><li>http://www.sharewareconnection.com/titles/secure-syst...
Upcoming SlideShare
Loading in …5
×

Ways To Secure It Systems

619 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Ways To Secure It Systems

  1. 1. Ways to secure IT Systems Presented by: Francis Guison OOA
  2. 2. Importance <ul><li>Information and the systems that process are a critical resource for an organization, indeed it is a fundamental management responsibility. </li></ul><ul><li>Combined with the complexity of current software systems and networks this presents great security challenges for both producers and consumers of information technology. </li></ul>
  3. 3. Threats <ul><li>Spam </li></ul><ul><li>Phishing attacks </li></ul><ul><li>Spyware </li></ul><ul><li>Ineffective Firewall </li></ul><ul><li>Cyber crime </li></ul><ul><li>Virus </li></ul><ul><li>Worms </li></ul>
  4. 4. Solution - Ways to Secure <ul><li>When developing a security management plan, an excellent place to start is to conduct a security self-assessment. </li></ul><ul><li>Security management plan should be updated to reflect each control objective and technique decision. </li></ul><ul><li>The implementation will depend on the amount of security expertise that the organisation has available to it </li></ul>
  5. 5. <ul><li>subscribe to one of the numerous security journals, web sites and mailing lists. </li></ul>
  6. 6. Needs <ul><li>Cost-effective security </li></ul><ul><li>Privacy of sensitive unclassified information in Federal computer systems. </li></ul>
  7. 7. Security Softwares <ul><li>Secure Information Courier </li></ul><ul><li>  1 Click & Lock </li></ul><ul><li>  FOX Password Safe </li></ul><ul><li>JSCAPE Secure FTP Server </li></ul>
  8. 8. Sources: <ul><li>http://www.ameinfo.com/48826.html </li></ul><ul><li>http://www.sharewareconnection.com/titles/secure-system.htm </li></ul><ul><li>www.google.com </li></ul>

×