SlideShare a Scribd company logo
1 of 31
Network Security
Grading
 Mid Term=
 Assignments =
 Quizzes =
 Term Project/viva/presentation =
 Final Term =
PU Gujranwala
The art of war teaches us to rely not
on the likelihood of the enemy's not
coming, but on our own readiness to
receive him; not on the chance of his
not attacking, but rather on the fact
that we have made our position
unassailable.
PU Gujranwala
—The Art of War, Sun Tzu
Information Security
What is Information Security…?
PU Gujranwala
Information Security
 Information Security is the name given to the
preventive steps we take to guard our
Information and Information System.
 Measures adopted to prevent the
unauthorized access, misuse, modification,
disclosure or destruction.
PU Gujranwala
Critical Characteristics of
Information Security
 Confidentiality
 Integrity
 Availability
PU Gujranwala
Confidentiality
 Confidentiality is the property of preventing
disclosure of information to unauthorized individuals
or systems.
 Information is available only to people with rightful
access.
 Ensuring that only those with the rights and
privileges to access a particular set of information are
able to do so.
Methods:
Data Encryption
User IDs and Passwords
PU Gujranwala
Integrity
 Information can only be changed by authorized
personnel.
 The quality or state of being whole, complete and
uncorrupted is the integrity of information.
 Integrity can be violated by a virus or a user.
 Integrity check can be done through:
 File size
 Checksums for verification of data integrity
 File hashing
PU Gujranwala
Availability
 Enables users who need to access information to do
so without interference or obstruction and receive it
in required format.
 The information is available only to the authorized
users all the time.
 Backups and Recovery
 RAID
 Alternate Links
PU Gujranwala
Authenticity
 Authenticity of information is the quality or state of
being genuine or original, rather than a reproduction
or fabrication.
PU Gujranwala
Privacy
 Privacy-means different things to different people, is
the right to be left alone and right to be free of
unreasonable personal instructions.
 Information privacy – The right to determine when
and up to what extent information about oneself can
be shared with others
 Organizational privacy – Governments agencies,
corporations, and other organizations may desire to
keep their activities or secrets from being revealed to
other organizations or individuals.
PU Gujranwala
Components of an Information
System
 Software
 Hardware
 Data
 People
 Procedures
PU Gujranwala
Software
 Bugs, Weaknesses and Holes.
 An error or defect in software or hardware that causes a
program to malfunction
 Security Hole (something you need to fix now)
 Security Warning ( something you need to fix soon)
 Security Note (something you need to fix when you get
around to it, or just some information that you should
consider)
 Patches and Service Packs.
 A patch is a piece of software designed to fix problems or
update a computer program and its supporting data. This
includes fixing security vulnerabilities and other bugs.
 A service pack (in short SP) is a collection of updates, fixes
and/or enhancements to a software program delivered in
the form of a single installable package.
PU Gujranwala
Hardware
 It Houses and Executes a software.
 Stores and carries the data.
 Provides Interfaces for the entry and removal of
information from the system.
 Physical security policies deal with the H/W.
PU Gujranwala
Data
 The most important and valuable thing for any
organization.
 Main object of intentional attacks.
 Must be protected from unauthorized access.
PU Gujranwala
People
 All that interact with the System.
 Main threat to information security.
PU Gujranwala
Procedures
 Procedures are written instructions for accomplishing
a specific task.
 Mechanism adopted to achieve an objective.
PU Gujranwala
What is Network Security?
 Network Security is the protection of networking
components, connections and contents.
 Effort to create a secure computing platform, so
users or programs cannot perform actions that they
are not allowed to do.
PU Gujranwala
Network Security as a Continuous
Process
 Network security is a continuous process built around a
security policy.
 Step 1: Secure
 Step 2: Monitor
 Step 3: Test
 Step 4: Improve
PU Gujranwala
Step 1: Secure the Network
 Implement security solutions to prevent unauthorized
access and to protect information.
 Authentication
 Encryption
 Firewalls
 Vulnerability Patching
PU Gujranwala
Step 2: Monitor Security
 Detects violations to the security policy
 Involves system auditing and real-time intrusion
detection
 Validates the security implementation in
Step 1
PU Gujranwala
Step 3: Test Security
 Validates effectiveness of the security policy through
system auditing and network scanning
 Whether the system fulfills the security requirements
or not.
PU Gujranwala
Step 4: Improve Security
 Use information from the monitor and test phases to
make improvements to the security implementation.
 Adjust the security policy as security holes and risks
are identified.
PU Gujranwala
Terms related to Security
 Assets
 Threats
 Attack
 Vulnerability
 Risk Analysis
 Countermeasures
 Hacking
PU Gujranwala
Asset
 An asset is the organizational resource that is being
protected.
 It can be logical like website, information, data.
 It can be physical like computer system or other
tangible object.
PU Gujranwala
 Threat
 A person, thing, event or idea which poses some danger to an
asset (in terms of confidentiality, integrity, availability or legitimate
use).
 A possible means by which a security policy may be breached.
 An attack
 An assault against a computer system or network as a result of
deliberate, intelligent action; for example, denial of service attacks,
penetration and sabotage.
 It is a realization of a threat.
Threats and Attack
PU Gujranwala
 Vulnerability
 A weakness in the system that can be exploited to cause loss or
harm
 In computer security, the word vulnerability refers to a weakness in
a system allowing an attacker to violate the confidentiality,
integrity, availability ,access control, consistency or audit
mechanisms of the system or the data and applications it hosts
 Control, Countermeasure, safeguard
 An action, device, procedure or technique that removes or reduces
a vulnerability.
PU Gujranwala
Vulnerability and Countermeasure
Risk = Threat + Vulnerability
 Threats without vulnerabilities pose no risk.
 Likewise, vulnerabilities without threats pose no risk.
 Risk is the probability that something can happen.
 Risk analysis can be quantitative or qualitative.
PU Gujranwala
Cont…
 Risk can be qualitatively defined in three levels:
 Low- Action to remove the vulnerability should be taken if possible
 Medium- Action to remove the vulnerability is advisable
 High- Action should be taken immediately to remove this
vulnerability
PU Gujranwala
Hacking
 Can be defined positively and negatively:
 To write computer programs for enjoyment.
 To gain access to a computer illegally.
 A person who writes programs in assembly language or in system-
level languages, such as C. The term often refers to any
programmer, but its true meaning is someone with a strong
technical background who is "hacking away" at the bits and bytes.
 During the 1990s, the term "hacker" became synonymous with
"cracker," which is a person who performs some form of computer
sabotage. The association is understandable. In order to be an
effective cracker, you had to be a good hacker, thus the terms got
intertwined, and hacker won out in the popular press.
PU Gujranwala
Summary
What we have studied:
 What is Information Security?
 What is Network Security?
 Assets, Threats and Countermeasures.
PU Gujranwala

More Related Content

What's hot

What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecuritysommerville-videos
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNithin Raj
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero TrustOkta-Inc
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Network Security
Network SecurityNetwork Security
Network Securityforpalmigho
 

What's hot (20)

What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
System security
System securitySystem security
System security
 
Information security
Information securityInformation security
Information security
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Network security
Network securityNetwork security
Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 

Similar to Basic Concepts of information security.ppt

Describe two methods for communicating the material in an Informatio.pdf
Describe two methods for communicating the material in an Informatio.pdfDescribe two methods for communicating the material in an Informatio.pdf
Describe two methods for communicating the material in an Informatio.pdfarchgeetsenterprises
 
Exploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfExploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfAmeliaJonas2
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPiBits
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 
Security testing
Security testingSecurity testing
Security testingbaskar p
 
CH01-CompSec4e.pptx
CH01-CompSec4e.pptxCH01-CompSec4e.pptx
CH01-CompSec4e.pptxams1ams11
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 
System and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingSystem and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingBiagio Botticelli
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing ProfessionalsTechWell
 
Website security
Website securityWebsite security
Website securityRIPPER95
 
01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdfRiyaSonawane
 

Similar to Basic Concepts of information security.ppt (20)

It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
IDS Research
IDS ResearchIDS Research
IDS Research
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Ch13 - Security Engineering
Ch13 - Security EngineeringCh13 - Security Engineering
Ch13 - Security Engineering
 
Ch13 security engineering
Ch13 security engineeringCh13 security engineering
Ch13 security engineering
 
Describe two methods for communicating the material in an Informatio.pdf
Describe two methods for communicating the material in an Informatio.pdfDescribe two methods for communicating the material in an Informatio.pdf
Describe two methods for communicating the material in an Informatio.pdf
 
Exploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfExploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdf
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
 
introduction of ethical hacking. ppt
introduction of ethical hacking. pptintroduction of ethical hacking. ppt
introduction of ethical hacking. ppt
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
Penetration Testing Service in India Senselearner .pdf
Penetration Testing Service in India Senselearner .pdfPenetration Testing Service in India Senselearner .pdf
Penetration Testing Service in India Senselearner .pdf
 
Security testing
Security testingSecurity testing
Security testing
 
CH01-CompSec4e.pptx
CH01-CompSec4e.pptxCH01-CompSec4e.pptx
CH01-CompSec4e.pptx
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
System and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingSystem and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration Testing
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Website security
Website securityWebsite security
Website security
 
002.itsecurity bcp v1
002.itsecurity bcp v1002.itsecurity bcp v1
002.itsecurity bcp v1
 
01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf
 

Recently uploaded

Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 

Recently uploaded (20)

Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 

Basic Concepts of information security.ppt

  • 2. Grading  Mid Term=  Assignments =  Quizzes =  Term Project/viva/presentation =  Final Term = PU Gujranwala
  • 3. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. PU Gujranwala —The Art of War, Sun Tzu
  • 4. Information Security What is Information Security…? PU Gujranwala
  • 5. Information Security  Information Security is the name given to the preventive steps we take to guard our Information and Information System.  Measures adopted to prevent the unauthorized access, misuse, modification, disclosure or destruction. PU Gujranwala
  • 6. Critical Characteristics of Information Security  Confidentiality  Integrity  Availability PU Gujranwala
  • 7. Confidentiality  Confidentiality is the property of preventing disclosure of information to unauthorized individuals or systems.  Information is available only to people with rightful access.  Ensuring that only those with the rights and privileges to access a particular set of information are able to do so. Methods: Data Encryption User IDs and Passwords PU Gujranwala
  • 8. Integrity  Information can only be changed by authorized personnel.  The quality or state of being whole, complete and uncorrupted is the integrity of information.  Integrity can be violated by a virus or a user.  Integrity check can be done through:  File size  Checksums for verification of data integrity  File hashing PU Gujranwala
  • 9. Availability  Enables users who need to access information to do so without interference or obstruction and receive it in required format.  The information is available only to the authorized users all the time.  Backups and Recovery  RAID  Alternate Links PU Gujranwala
  • 10. Authenticity  Authenticity of information is the quality or state of being genuine or original, rather than a reproduction or fabrication. PU Gujranwala
  • 11. Privacy  Privacy-means different things to different people, is the right to be left alone and right to be free of unreasonable personal instructions.  Information privacy – The right to determine when and up to what extent information about oneself can be shared with others  Organizational privacy – Governments agencies, corporations, and other organizations may desire to keep their activities or secrets from being revealed to other organizations or individuals. PU Gujranwala
  • 12. Components of an Information System  Software  Hardware  Data  People  Procedures PU Gujranwala
  • 13. Software  Bugs, Weaknesses and Holes.  An error or defect in software or hardware that causes a program to malfunction  Security Hole (something you need to fix now)  Security Warning ( something you need to fix soon)  Security Note (something you need to fix when you get around to it, or just some information that you should consider)  Patches and Service Packs.  A patch is a piece of software designed to fix problems or update a computer program and its supporting data. This includes fixing security vulnerabilities and other bugs.  A service pack (in short SP) is a collection of updates, fixes and/or enhancements to a software program delivered in the form of a single installable package. PU Gujranwala
  • 14. Hardware  It Houses and Executes a software.  Stores and carries the data.  Provides Interfaces for the entry and removal of information from the system.  Physical security policies deal with the H/W. PU Gujranwala
  • 15. Data  The most important and valuable thing for any organization.  Main object of intentional attacks.  Must be protected from unauthorized access. PU Gujranwala
  • 16. People  All that interact with the System.  Main threat to information security. PU Gujranwala
  • 17. Procedures  Procedures are written instructions for accomplishing a specific task.  Mechanism adopted to achieve an objective. PU Gujranwala
  • 18. What is Network Security?  Network Security is the protection of networking components, connections and contents.  Effort to create a secure computing platform, so users or programs cannot perform actions that they are not allowed to do. PU Gujranwala
  • 19. Network Security as a Continuous Process  Network security is a continuous process built around a security policy.  Step 1: Secure  Step 2: Monitor  Step 3: Test  Step 4: Improve PU Gujranwala
  • 20. Step 1: Secure the Network  Implement security solutions to prevent unauthorized access and to protect information.  Authentication  Encryption  Firewalls  Vulnerability Patching PU Gujranwala
  • 21. Step 2: Monitor Security  Detects violations to the security policy  Involves system auditing and real-time intrusion detection  Validates the security implementation in Step 1 PU Gujranwala
  • 22. Step 3: Test Security  Validates effectiveness of the security policy through system auditing and network scanning  Whether the system fulfills the security requirements or not. PU Gujranwala
  • 23. Step 4: Improve Security  Use information from the monitor and test phases to make improvements to the security implementation.  Adjust the security policy as security holes and risks are identified. PU Gujranwala
  • 24. Terms related to Security  Assets  Threats  Attack  Vulnerability  Risk Analysis  Countermeasures  Hacking PU Gujranwala
  • 25. Asset  An asset is the organizational resource that is being protected.  It can be logical like website, information, data.  It can be physical like computer system or other tangible object. PU Gujranwala
  • 26.  Threat  A person, thing, event or idea which poses some danger to an asset (in terms of confidentiality, integrity, availability or legitimate use).  A possible means by which a security policy may be breached.  An attack  An assault against a computer system or network as a result of deliberate, intelligent action; for example, denial of service attacks, penetration and sabotage.  It is a realization of a threat. Threats and Attack PU Gujranwala
  • 27.  Vulnerability  A weakness in the system that can be exploited to cause loss or harm  In computer security, the word vulnerability refers to a weakness in a system allowing an attacker to violate the confidentiality, integrity, availability ,access control, consistency or audit mechanisms of the system or the data and applications it hosts  Control, Countermeasure, safeguard  An action, device, procedure or technique that removes or reduces a vulnerability. PU Gujranwala Vulnerability and Countermeasure
  • 28. Risk = Threat + Vulnerability  Threats without vulnerabilities pose no risk.  Likewise, vulnerabilities without threats pose no risk.  Risk is the probability that something can happen.  Risk analysis can be quantitative or qualitative. PU Gujranwala
  • 29. Cont…  Risk can be qualitatively defined in three levels:  Low- Action to remove the vulnerability should be taken if possible  Medium- Action to remove the vulnerability is advisable  High- Action should be taken immediately to remove this vulnerability PU Gujranwala
  • 30. Hacking  Can be defined positively and negatively:  To write computer programs for enjoyment.  To gain access to a computer illegally.  A person who writes programs in assembly language or in system- level languages, such as C. The term often refers to any programmer, but its true meaning is someone with a strong technical background who is "hacking away" at the bits and bytes.  During the 1990s, the term "hacker" became synonymous with "cracker," which is a person who performs some form of computer sabotage. The association is understandable. In order to be an effective cracker, you had to be a good hacker, thus the terms got intertwined, and hacker won out in the popular press. PU Gujranwala
  • 31. Summary What we have studied:  What is Information Security?  What is Network Security?  Assets, Threats and Countermeasures. PU Gujranwala

Editor's Notes

  1. Twenty-Five Hundred years ago, Sun Tzu wrote this classic book of military strategy based on Chinese warfare and military thought. Since that time, all levels of military have used the teaching on Sun Tzu to warfare and civilization have adapted these teachings for use in politics, business and everyday life. The Art of War is a book which should be used to gain advantage of opponents in the boardroom and battlefield alike.