SlideShare a Scribd company logo
It Security
Attacks Viruses, Worms, Trojans Spam, Adware, Malware, Phishing Hacking is the intentional use of a computer resource without authorization or in excess of authorization. Denial-of-service (DoS) attacks overload victim servers so that they cannot serve users.
Attackers Traditional hackers were curiosity driven. Today’s hackers are criminals that dominate the attack world. On the horizon, cyberterror attacks by terrorist and cyberwar attacks by foreign governments could cause unprecedented levels of damage.
Security Management Security is primarily a management issue, not a technical issue. Risk Analysis – balancing cost and benefits of protection Comprehensive Security – Closing all avenues of attacks
Access Control Identify and list each asset Rate the sensitivity of each asset in terms of security risk Access Control Plan.  Also called Triple AAA.  Authentication, Authorization, and Auditing
Firewalls, IDSs, and IPSs Firewalls examine packets passing through the firewall. Intrusion Detection Systems (IDS) are designed to detect suspicious traffic. Intrusion Prevention Systems (IPS) are used to recognize complex attacks.  It helps prevent false positives.
Host Hardening and Vulnerability Testing Servers can be hardened by having vulnerabilities patched Vulnerability Test should be conducted by attacking the network (with permission) , in order to identify security weaknesses. http://www.youtube.com/watch?v=MJNJjh4jORY

More Related Content

What's hot

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Network security
Network securityNetwork security
Network security
Simranpreet Singh
 
Network Security
Network SecurityNetwork Security
Network Security
forpalmigho
 
system Security
system Security system Security
system Security
Gaurav Mishra
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Brute force attack
Brute force attackBrute force attack
Brute force attackjoycruiser
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
Ankita Ganguly
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
System hacking
System hackingSystem hacking
System hacking
CAS
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
A. Shamel
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
gaurav koriya
 

What's hot (20)

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Dmz
Dmz Dmz
Dmz
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
system Security
system Security system Security
system Security
 
Information security
Information securityInformation security
Information security
 
Network security
Network security Network security
Network security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
System hacking
System hackingSystem hacking
System hacking
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 

Similar to IT Security Presentation

Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
xsy
 
vanmathy cryptography network security
vanmathy cryptography network securityvanmathy cryptography network security
vanmathy cryptography network security
PriyadharshiniVS
 
vanmathy cryptography network security
vanmathy cryptography network security vanmathy cryptography network security
vanmathy cryptography network security
PriyadharshiniVS
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
srtwgwfwwgw
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
ManassahIjudigal
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Cyber security
Cyber securityCyber security
Cyber security
Akdu095
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
Gayathridevi120
 
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill Educat
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill EducatChapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill Educat
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill Educat
EstelaJeffery653
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
lochanrajdahal
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
ijctet
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
LearningwithRayYT
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
cyberprosocial
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
researchinventy
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
nazar60
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
InsecureLab
 

Similar to IT Security Presentation (20)

Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
vanmathy cryptography network security
vanmathy cryptography network securityvanmathy cryptography network security
vanmathy cryptography network security
 
vanmathy cryptography network security
vanmathy cryptography network security vanmathy cryptography network security
vanmathy cryptography network security
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
 
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill Educat
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill EducatChapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill Educat
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill Educat
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Data security
Data securityData security
Data security
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 

IT Security Presentation

  • 2. Attacks Viruses, Worms, Trojans Spam, Adware, Malware, Phishing Hacking is the intentional use of a computer resource without authorization or in excess of authorization. Denial-of-service (DoS) attacks overload victim servers so that they cannot serve users.
  • 3. Attackers Traditional hackers were curiosity driven. Today’s hackers are criminals that dominate the attack world. On the horizon, cyberterror attacks by terrorist and cyberwar attacks by foreign governments could cause unprecedented levels of damage.
  • 4. Security Management Security is primarily a management issue, not a technical issue. Risk Analysis – balancing cost and benefits of protection Comprehensive Security – Closing all avenues of attacks
  • 5. Access Control Identify and list each asset Rate the sensitivity of each asset in terms of security risk Access Control Plan. Also called Triple AAA. Authentication, Authorization, and Auditing
  • 6. Firewalls, IDSs, and IPSs Firewalls examine packets passing through the firewall. Intrusion Detection Systems (IDS) are designed to detect suspicious traffic. Intrusion Prevention Systems (IPS) are used to recognize complex attacks. It helps prevent false positives.
  • 7. Host Hardening and Vulnerability Testing Servers can be hardened by having vulnerabilities patched Vulnerability Test should be conducted by attacking the network (with permission) , in order to identify security weaknesses. http://www.youtube.com/watch?v=MJNJjh4jORY