SlideShare a Scribd company logo
1 of 41
Md.Jamal Uddin
Information Security and Backup System
Basicsof InformationSystem
Data: raw facts – Alphanumeric, image, audio, and video
Information: collection of facts organized in such a way that they have
additional value beyond the value of the facts themselves
An Information System(IS) is a set of interrelated components that
collect or retrieve, process, store and distribute information to support
decision making and control in an organization.
Basicsof InformationSystem
Processing/manipulation
Input/output
Control
Storage
Today Information Systems are mostly computerized, and software based.
The major functions of an IS are-
WhyInformation Security???
Web site defacement
Use of IT across
businesses
Theft of confidential data
Fast growth of Internet
Financial Frauds
Commercialization of
Internet
 Data Scavenging
 Shoulder Surfing
 Piggy Backing
 Man In the middle
 Social Engineering
 Buffer overruns
 SQL injections Cookies
 Cross Site Scripting (XSS)
 SPAM
 Denial Of Service (DOS)/ DDOS
 Virus / Worms/ Trojans
 Spyware / Adware
 Phishing
 Spoofing
Cybercrime
Cyber Crime Techniques
Confidentiality
It is the principle that information will not be
disclosed to unauthorized subjects.
Examples: Unauthorized network data sniffing
Listening a phone conversation.
Integrity
It is the protection of system
information or process from intentional
or accidental unauthorized changes.
Availability
It defines that information or resources
are available when required.
02
01 03
Three basic elements of Information Security.
OtherElementsofInfoSec
Identification recognition of an entity by a system.
Authentication Process of verifying identity.
Accountability Tracing activities of individual on a system.
Authorization Granting access or other permissions.
Privacy
Right of individual to control the sharing of
information about him.
HowtoachieveInformationSecurity???
1 3
Information Security does
not mean only installing
antivirus and firewalls.
Information assets are those resources
that store, transport, create, use or are
information.
2
Information security tends
to protect hardware,
software, data,
procedures, records,
supplies and human
resources.
HowtoachieveInformation
Security???
Policies, standards,
procedures, guidelines,
employee screening,
change control, Security
awareness trainings.
Access controls,
encryption, Firewalls, IDS,
IPS,HTTPS
controlled physical access
to resources, monitoring,
no USB or CDROM etc.
Administrative
Controls
Technical
Controls
Physical
Controls
 Always use official software.
 Keep all software up to date with patches.
 If using free software always download from original developers site.
 Do not disclose all your information on internet sites like
orkut/Facebook.
 Use Internet with control.
 Use email properly.
 Take care while discarding your waste material.
 Use small gadgets carefully as information storage.
 Be careful while surfing from a cybercafe
SomeGoodHabits
Threat
A threat is a possible event that can damage or harm an
Information System.
Vulnerability
It is the weakness within a system. It is the degree of exposure in view of threat.
Countermeasures
It is a set of actions implemented to prevent threats.
Information System Security
Information System Security
Computer Viruses
A code that performs malicious act.
Can insert itself into other programs in a system.
Worm is a virus that can replicate itself to other systems using network.
Biggest threat to personal computing.
Trojan Horse
A program that performs malicious or unauthorizedacts.
Distributed as a good program.
May be hidden within a good program.
Information System Security
Denial of Service (DoS)
Making system unavailable to legitimate users.
Impersonation
Assuming someone else’s identity and enjoying his privileges.
Salami Technique
Diverting small amount of money from a large number of accounts maintained
by the system.
Small amounts go unnoticed.
Spoofing
Configuring a computer to assume some other computers identity.
Information System Security
Scavenging
Unauthorized access to information by searching through the remains
after a job is finished.
Dumpster diving
Data Leakage
Various techniques are used to obtain stored data
SQL injection
Error Outputs
Wiretapping
Tapping computer transmission lines to obtain data.
Theft of Mobile Devices
Information System Security
Myths, rumors and hoaxes
Created by sending false emails to as many people as possible.
These may have significant impact on companies, their reputation and
business.
Web Site Attacks
Web site defacement
Adding wrong information
Increase in cyber crime rates
Organized cyber criminals
Information System Security
Employee Issues
Disgruntle Employees
Availability of hacking tools
Social Engineering Attacks
Sharing Passwords
Sharing Official Systems
Not following clean desk policy
Rise in Mobile workers
Use mobile devices
Wireless access
Lots of organization data exposed
Building Blocks of Information Security
Basic Terms and Definitions
Encryption
Modification of data for security reasons prior to their transmissions so that it is
not comprehensible without the decoding method.
Cipher
Cryptographic transformation that operates on characters or bits of data.
Cryptanalysis
Methods to break the cipher so that encrypted message can be read.
Caesar Cipher in Cryptography
The Caesar Cipher technique is one of the earliest and simplest method of
encryption technique. It’s simply a type of substitution cipher, i.e., each
letter of a given text is replaced by a letter some fixed number of positions
down the alphabet. For example with a shift of 1, A would be replaced by
B, B would become C, and so on.
Text : ABCDEFGHIJKLMNOPQRSTUVWXYZ
Shift: 23
Cipher: XYZABCDEFGHIJKLMNOPQRSTUVW
Text : ATTACKATONCE
Shift: 4
Cipher: EXXEGOEXSRGI
Building Blocks of Information Security
Electronic Signature
Process that operates on a message to assure message source authenticity, integrity
and non-repudiation.
Non-Repudiation
Methods by which the transmitted data is tagged with sender’s identity as a proof so
neither can deny the transmission.
Steganography
Method of hiding the existence of data. The bit map images are regularly used to
transmit hidden messages.
Data Backup and
Disaster Recovery
What is Backup?
 Backup – is a duplicate copy of key information
such physical (paper) and computer records.
 A good set of back procedures is necessary to ensure
that data is protected.
What is Backup?
 Data that should be backed up regularly includes, but is not
limited to
 email correspondence, audit files, user information, utilities
and applications, operating systems, financial data and
databases, as well as customer lists.
Types of Media Backup
 Tape Drives
 Tape drivers can range in capacity from a few
megabytes to hundreds of gigabytes.
 Disk Drives
 Disk drives offers high speed but expensive
backup media.
Types of Media Backup
 Removable Disks
 Removable drives are fast, easy to install and
portable.
Types of Media Backup
Types of Backup Media (cont’d)
 Digital Audio Tape
 DAT drives have a larger capacity as
compared to standard tape drive.
Types ofBackupMedia (cont’d)
 Optical Jukeboxes
 Optical jukebox offer excellent amounts of
secure storage space ranging from 5 to 20
terabytes.
Types of Backup Media (cont’d)
 Autoloader tape systems
 Autoloader tape systems use a magazine of tapes to create
extended backup volumes.
 It is recommended for businesses that needs very high capacity.
Factors in Choosing Backup Media
 Factors to consider in selecting an appropriate backup
solution:
 Speed
 It refers to how fast data can be backed upand
recovered.
 Reliability
 It refers to the reliability of the backup serviceand media.
Factors in Choosing Backup Media
 Capacity
 It refers to the amount of data to backup giventhe time and resource constraints.
 Extensibility
 It refers to the ability of the backup solutionto
address the current needs of theorganization
 Cost
 It refers to the cost of the backup solution and it
should conform to the budgetavailability.
Backup Tips
 Provide a point person to perform rollback in the case of an
emergency.
 Keep a record of the contents of the backup media and date of
backup.
Always verify backup.
 Create a restore point.
Backup Tips
 Encrypt and provide high permission on the
backup file.
 Create a detailed guideline on backup
recovery.
Access Control - Physical
• Follow Security Procedures
• Wear Identity Cards and Badges
• Ask unauthorized visitor his credentials
• Attend visitors in Reception and Conference Room only
• Bring visitors in operations area without prior
permission
• Bring hazardous and combustible material in secure
area
• Practice ―Piggybacking‖
• Bring and use pen drives, zip drives, ipods, other storage devices unless and
otherwise authorized to do so
Password Guidelines
 Always use at least 8 character password with combination of
alphabets, numbers and special characters (*, %, @, #, $, ^)
 Use passwords that can be easily remembered by you
 Change password regularly as per policy
 Use password that is significantly different from earlier passwords
 Use passwords which reveals your personal
information or words found in dictionary
 Write down or Store passwords
 Share passwords over phone or Email
 Use passwords which do not match above complexity criteria
 Do not access internet through dial-up connectivity
 Do not use internet for viewing, storing or transmitting
obscene or pornographic material
 Do not use internet for accessing auction sites
 Do not use internet for hacking other computer systems
 Do not use internet to download / upload commercial
software / copyrighted material
 Use internet services for business purposes only
Internet Usage
E-mail Usage
 Do not use official ID for any personal subscription purpose
 Do not send unsolicited mails of any type like chain letters or
E-mail Hoax
 Do not send mails to client unless you are authorized to do so
 Do not post non-business related information to large
number of users
 Do not open the mail or attachment which is suspected to be virus or
received from an unidentified sender
Use official mail for business purposes only
Follow the mail storage guidelines to avoid blocking of E-mails
 If you come across any junk / spam mail, do the following
a) Remove the mail.
b) Inform the security help desk
c) Inform the same to server administrator
d) Inform the sender that such mails are undesired
Human Wall Is Always Better Than A Firewall
Cybersecurity Tools
Penetration testing tools
Kali Linux
Metasploit
Password auditing and packet sniffers
cybersecurity tools
Cain and Abel
Wireshark
John the Ripper
Tcpdump
Cybersecurity tools for network defense
Netstumbler
Aircrack-ng
KisMAC
Tools for scanning web vulnerabilities
Nmap
Nikto
Nexpose
Paros Proxy
Burp Suite
Nessus Professional
Cybersecurity Tools
Encryption cybersecurity tools
TrueCrypt
KeyPass
Tor
Tools for monitoring network security
POf
Argus
Nagios
OSSEC
Cybersecurity tools for detecting network
intrusions
Snort
Acunetix
Forcepoint
GFI LanGuard
Most Dangerous New Malware
Clop Ransomware
Fake Updates
Zeus Gameover
News Malware Attacks
Social Engineering
AI Attacks
Cryptojacking
Freeware
RaaS
IoT Device Attacks
Md.Jamal Uddin
Con/Whatsapp:01814840483
Email:Engrjamal22@gmail.Com
Fb:Engrmdjamaluddin22
Information Security and Backup System
Thank
You

More Related Content

What's hot

Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating systemAbou Bakr Ashraf
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.pptZaheer720515
 
Top 10 cloud service providers
Top 10 cloud service providersTop 10 cloud service providers
Top 10 cloud service providersVineet Garg
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database securitySyaiful Ahdan
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and AwarenessAbdul Rahman Sherzad
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud ComputingPranav Sharma
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesInformation Technology
 
Database security
Database securityDatabase security
Database securityCAS
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server SecurityJITENDRA KUMAR PATEL
 

What's hot (20)

Database Security
Database SecurityDatabase Security
Database Security
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
Information security
Information securityInformation security
Information security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
Top 10 cloud service providers
Top 10 cloud service providersTop 10 cloud service providers
Top 10 cloud service providers
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database security
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
Database security
Database securityDatabase security
Database security
 
Cloud storage
Cloud storageCloud storage
Cloud storage
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System Vulnerabilities
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
Database security
Database securityDatabase security
Database security
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server Security
 

Similar to information security and backup system

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And PrivacyMISY
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyJan Wong
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Find Powerful Methods To Fight Against Cyber Threats?
Find Powerful Methods To Fight Against Cyber Threats?Find Powerful Methods To Fight Against Cyber Threats?
Find Powerful Methods To Fight Against Cyber Threats?VRS Technologies
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security STS
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxCabdullhiY
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 

Similar to information security and backup system (20)

information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Find Powerful Methods To Fight Against Cyber Threats?
Find Powerful Methods To Fight Against Cyber Threats?Find Powerful Methods To Fight Against Cyber Threats?
Find Powerful Methods To Fight Against Cyber Threats?
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Data security
Data securityData security
Data security
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
 

More from Engr. Md. Jamal Uddin Rayhan

Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.Engr. Md. Jamal Uddin Rayhan
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Engr. Md. Jamal Uddin Rayhan
 
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...Engr. Md. Jamal Uddin Rayhan
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionEngr. Md. Jamal Uddin Rayhan
 
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUSTEngr. Md. Jamal Uddin Rayhan
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUSTEngr. Md. Jamal Uddin Rayhan
 
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AEBank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AEEngr. Md. Jamal Uddin Rayhan
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE Engr. Md. Jamal Uddin Rayhan
 
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...Engr. Md. Jamal Uddin Rayhan
 

More from Engr. Md. Jamal Uddin Rayhan (15)

DESCO AE CSE Question Solution
DESCO AE CSE Question SolutionDESCO AE CSE Question Solution
DESCO AE CSE Question Solution
 
OSI Model Cheat Sheet
OSI Model Cheat SheetOSI Model Cheat Sheet
OSI Model Cheat Sheet
 
Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.
 
Assistant Programmer, Bangladesh Bank
Assistant Programmer, Bangladesh BankAssistant Programmer, Bangladesh Bank
Assistant Programmer, Bangladesh Bank
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
 
Senior Officer , Pubali Bank Limited
Senior Officer , Pubali Bank LimitedSenior Officer , Pubali Bank Limited
Senior Officer , Pubali Bank Limited
 
Bangladesh telecommunication regulatory commision
Bangladesh telecommunication regulatory commisionBangladesh telecommunication regulatory commision
Bangladesh telecommunication regulatory commision
 
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
 
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
 
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AEBank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
 
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
 
Titas gas sub-assistant engineer question pattern
Titas gas sub-assistant engineer question patternTitas gas sub-assistant engineer question pattern
Titas gas sub-assistant engineer question pattern
 

Recently uploaded

dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxakanksha16arora
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 

information security and backup system

  • 2. Basicsof InformationSystem Data: raw facts – Alphanumeric, image, audio, and video Information: collection of facts organized in such a way that they have additional value beyond the value of the facts themselves An Information System(IS) is a set of interrelated components that collect or retrieve, process, store and distribute information to support decision making and control in an organization.
  • 3. Basicsof InformationSystem Processing/manipulation Input/output Control Storage Today Information Systems are mostly computerized, and software based. The major functions of an IS are-
  • 4. WhyInformation Security??? Web site defacement Use of IT across businesses Theft of confidential data Fast growth of Internet Financial Frauds Commercialization of Internet
  • 5.  Data Scavenging  Shoulder Surfing  Piggy Backing  Man In the middle  Social Engineering  Buffer overruns  SQL injections Cookies  Cross Site Scripting (XSS)  SPAM  Denial Of Service (DOS)/ DDOS  Virus / Worms/ Trojans  Spyware / Adware  Phishing  Spoofing Cybercrime Cyber Crime Techniques
  • 6. Confidentiality It is the principle that information will not be disclosed to unauthorized subjects. Examples: Unauthorized network data sniffing Listening a phone conversation. Integrity It is the protection of system information or process from intentional or accidental unauthorized changes. Availability It defines that information or resources are available when required. 02 01 03 Three basic elements of Information Security.
  • 7. OtherElementsofInfoSec Identification recognition of an entity by a system. Authentication Process of verifying identity. Accountability Tracing activities of individual on a system. Authorization Granting access or other permissions. Privacy Right of individual to control the sharing of information about him.
  • 8. HowtoachieveInformationSecurity??? 1 3 Information Security does not mean only installing antivirus and firewalls. Information assets are those resources that store, transport, create, use or are information. 2 Information security tends to protect hardware, software, data, procedures, records, supplies and human resources.
  • 9. HowtoachieveInformation Security??? Policies, standards, procedures, guidelines, employee screening, change control, Security awareness trainings. Access controls, encryption, Firewalls, IDS, IPS,HTTPS controlled physical access to resources, monitoring, no USB or CDROM etc. Administrative Controls Technical Controls Physical Controls
  • 10.  Always use official software.  Keep all software up to date with patches.  If using free software always download from original developers site.  Do not disclose all your information on internet sites like orkut/Facebook.  Use Internet with control.  Use email properly.  Take care while discarding your waste material.  Use small gadgets carefully as information storage.  Be careful while surfing from a cybercafe SomeGoodHabits
  • 11. Threat A threat is a possible event that can damage or harm an Information System. Vulnerability It is the weakness within a system. It is the degree of exposure in view of threat. Countermeasures It is a set of actions implemented to prevent threats. Information System Security
  • 12. Information System Security Computer Viruses A code that performs malicious act. Can insert itself into other programs in a system. Worm is a virus that can replicate itself to other systems using network. Biggest threat to personal computing. Trojan Horse A program that performs malicious or unauthorizedacts. Distributed as a good program. May be hidden within a good program.
  • 13. Information System Security Denial of Service (DoS) Making system unavailable to legitimate users. Impersonation Assuming someone else’s identity and enjoying his privileges. Salami Technique Diverting small amount of money from a large number of accounts maintained by the system. Small amounts go unnoticed. Spoofing Configuring a computer to assume some other computers identity.
  • 14. Information System Security Scavenging Unauthorized access to information by searching through the remains after a job is finished. Dumpster diving Data Leakage Various techniques are used to obtain stored data SQL injection Error Outputs Wiretapping Tapping computer transmission lines to obtain data. Theft of Mobile Devices
  • 15. Information System Security Myths, rumors and hoaxes Created by sending false emails to as many people as possible. These may have significant impact on companies, their reputation and business. Web Site Attacks Web site defacement Adding wrong information Increase in cyber crime rates Organized cyber criminals
  • 16. Information System Security Employee Issues Disgruntle Employees Availability of hacking tools Social Engineering Attacks Sharing Passwords Sharing Official Systems Not following clean desk policy Rise in Mobile workers Use mobile devices Wireless access Lots of organization data exposed
  • 17. Building Blocks of Information Security Basic Terms and Definitions Encryption Modification of data for security reasons prior to their transmissions so that it is not comprehensible without the decoding method. Cipher Cryptographic transformation that operates on characters or bits of data. Cryptanalysis Methods to break the cipher so that encrypted message can be read.
  • 18. Caesar Cipher in Cryptography The Caesar Cipher technique is one of the earliest and simplest method of encryption technique. It’s simply a type of substitution cipher, i.e., each letter of a given text is replaced by a letter some fixed number of positions down the alphabet. For example with a shift of 1, A would be replaced by B, B would become C, and so on. Text : ABCDEFGHIJKLMNOPQRSTUVWXYZ Shift: 23 Cipher: XYZABCDEFGHIJKLMNOPQRSTUVW Text : ATTACKATONCE Shift: 4 Cipher: EXXEGOEXSRGI
  • 19. Building Blocks of Information Security Electronic Signature Process that operates on a message to assure message source authenticity, integrity and non-repudiation. Non-Repudiation Methods by which the transmitted data is tagged with sender’s identity as a proof so neither can deny the transmission. Steganography Method of hiding the existence of data. The bit map images are regularly used to transmit hidden messages.
  • 21. What is Backup?  Backup – is a duplicate copy of key information such physical (paper) and computer records.  A good set of back procedures is necessary to ensure that data is protected.
  • 22. What is Backup?  Data that should be backed up regularly includes, but is not limited to  email correspondence, audit files, user information, utilities and applications, operating systems, financial data and databases, as well as customer lists.
  • 23. Types of Media Backup  Tape Drives  Tape drivers can range in capacity from a few megabytes to hundreds of gigabytes.
  • 24.  Disk Drives  Disk drives offers high speed but expensive backup media. Types of Media Backup
  • 25.  Removable Disks  Removable drives are fast, easy to install and portable. Types of Media Backup
  • 26. Types of Backup Media (cont’d)  Digital Audio Tape  DAT drives have a larger capacity as compared to standard tape drive.
  • 27. Types ofBackupMedia (cont’d)  Optical Jukeboxes  Optical jukebox offer excellent amounts of secure storage space ranging from 5 to 20 terabytes.
  • 28. Types of Backup Media (cont’d)  Autoloader tape systems  Autoloader tape systems use a magazine of tapes to create extended backup volumes.  It is recommended for businesses that needs very high capacity.
  • 29. Factors in Choosing Backup Media  Factors to consider in selecting an appropriate backup solution:  Speed  It refers to how fast data can be backed upand recovered.  Reliability  It refers to the reliability of the backup serviceand media.
  • 30. Factors in Choosing Backup Media  Capacity  It refers to the amount of data to backup giventhe time and resource constraints.  Extensibility  It refers to the ability of the backup solutionto address the current needs of theorganization  Cost  It refers to the cost of the backup solution and it should conform to the budgetavailability.
  • 31. Backup Tips  Provide a point person to perform rollback in the case of an emergency.  Keep a record of the contents of the backup media and date of backup. Always verify backup.  Create a restore point.
  • 32. Backup Tips  Encrypt and provide high permission on the backup file.  Create a detailed guideline on backup recovery.
  • 33. Access Control - Physical • Follow Security Procedures • Wear Identity Cards and Badges • Ask unauthorized visitor his credentials • Attend visitors in Reception and Conference Room only • Bring visitors in operations area without prior permission • Bring hazardous and combustible material in secure area • Practice ―Piggybacking‖ • Bring and use pen drives, zip drives, ipods, other storage devices unless and otherwise authorized to do so
  • 34. Password Guidelines  Always use at least 8 character password with combination of alphabets, numbers and special characters (*, %, @, #, $, ^)  Use passwords that can be easily remembered by you  Change password regularly as per policy  Use password that is significantly different from earlier passwords  Use passwords which reveals your personal information or words found in dictionary  Write down or Store passwords  Share passwords over phone or Email  Use passwords which do not match above complexity criteria
  • 35.  Do not access internet through dial-up connectivity  Do not use internet for viewing, storing or transmitting obscene or pornographic material  Do not use internet for accessing auction sites  Do not use internet for hacking other computer systems  Do not use internet to download / upload commercial software / copyrighted material  Use internet services for business purposes only Internet Usage
  • 36. E-mail Usage  Do not use official ID for any personal subscription purpose  Do not send unsolicited mails of any type like chain letters or E-mail Hoax  Do not send mails to client unless you are authorized to do so  Do not post non-business related information to large number of users  Do not open the mail or attachment which is suspected to be virus or received from an unidentified sender Use official mail for business purposes only Follow the mail storage guidelines to avoid blocking of E-mails  If you come across any junk / spam mail, do the following a) Remove the mail. b) Inform the security help desk c) Inform the same to server administrator d) Inform the sender that such mails are undesired
  • 37. Human Wall Is Always Better Than A Firewall
  • 38. Cybersecurity Tools Penetration testing tools Kali Linux Metasploit Password auditing and packet sniffers cybersecurity tools Cain and Abel Wireshark John the Ripper Tcpdump Cybersecurity tools for network defense Netstumbler Aircrack-ng KisMAC Tools for scanning web vulnerabilities Nmap Nikto Nexpose Paros Proxy Burp Suite Nessus Professional
  • 39. Cybersecurity Tools Encryption cybersecurity tools TrueCrypt KeyPass Tor Tools for monitoring network security POf Argus Nagios OSSEC Cybersecurity tools for detecting network intrusions Snort Acunetix Forcepoint GFI LanGuard
  • 40. Most Dangerous New Malware Clop Ransomware Fake Updates Zeus Gameover News Malware Attacks Social Engineering AI Attacks Cryptojacking Freeware RaaS IoT Device Attacks