SECURITY
ISSUES IN
INFORMATION
TECHNOLOGY
Submitte
Shweta Ve
Ashaina
Neha Kum
Here you could describe the
topic of the section
Market Analysis
Here you could describe the
topic of the section
01
02
WHAT IS INFORMATION SECURITY?
Information security is the protection
of information and information system
from unauthorized access, use,
disclosure ,disruption, modification, or
destruction in order to provide
confidentiality, Integrity, and
availability.
NEED OF SECURITY IN IT SYSTEM
● Protecting the functionality of the organization
● Enabling the safe operation of applications
● Protecting the data that the organization collect
and use
● Safeguarding technology assets in organization
SECURITY
IN
IT SYSTEM
ISSUES IN
IT SYSTEM
SECURITY
MALWARE- Malware is a combination of 2 terms- Malicious and
Software. So Malware basically means malicious software that can
be an intrusive program code or anything that is designed to
perform malicious operations on system.
VIRUSES AND WORMS- A computer virus is a malicious code that replicates
by copying itself to another program, system or host file.
A computer worm is a self replicating program that does not have to copy itself to
a host program or require human interaction to spread.
Phishing- phishing typically involves sending emails that purport to be from a
recognized and trusted source, usually with a fake link that invites them to enter
personal details into an online form
Ransomware - In a ransomware attack, the victim's computer is
locked, typically by encryption, which keeps the victim from using the
device or data that's stored on it. To regain access to the device or
data, the victim has to pay the hacker a ransom, typically in a virtual
currency such as bitcon.
SECURITY MEASURES
Fire wall-A firewall stops information being changed or stolen It
limits entry into a network to a authorised users and content.
Encryption-Encryption process of transforming information using an
algorithm to make it unreadable to anyone except those possessing special
knowledge, usually referred to as a key.
Anti virus- Anti-virus is a software that scans files or your computer's
memory for certain patterns that may indicate an infection. The patterns it
looks for are based on the signatures, or fingerprints, of known viruses.
BACKUP-Producing back up of all the data in one of the
reliable cloud service options. This way, in case the data is
encrypted and stolen, one can restore it quickly from the
cloud backups and get the operations up and
running in no time.
INSTALL CONTINOUS UPDATE
THANK
YOU!

iTM ppt....pptx

  • 1.
  • 2.
    Here you coulddescribe the topic of the section Market Analysis Here you could describe the topic of the section 01 02
  • 3.
    WHAT IS INFORMATIONSECURITY? Information security is the protection of information and information system from unauthorized access, use, disclosure ,disruption, modification, or destruction in order to provide confidentiality, Integrity, and availability.
  • 4.
    NEED OF SECURITYIN IT SYSTEM ● Protecting the functionality of the organization ● Enabling the safe operation of applications ● Protecting the data that the organization collect and use ● Safeguarding technology assets in organization SECURITY IN IT SYSTEM
  • 5.
  • 6.
    MALWARE- Malware isa combination of 2 terms- Malicious and Software. So Malware basically means malicious software that can be an intrusive program code or anything that is designed to perform malicious operations on system. VIRUSES AND WORMS- A computer virus is a malicious code that replicates by copying itself to another program, system or host file. A computer worm is a self replicating program that does not have to copy itself to a host program or require human interaction to spread. Phishing- phishing typically involves sending emails that purport to be from a recognized and trusted source, usually with a fake link that invites them to enter personal details into an online form
  • 7.
    Ransomware - Ina ransomware attack, the victim's computer is locked, typically by encryption, which keeps the victim from using the device or data that's stored on it. To regain access to the device or data, the victim has to pay the hacker a ransom, typically in a virtual currency such as bitcon.
  • 8.
    SECURITY MEASURES Fire wall-Afirewall stops information being changed or stolen It limits entry into a network to a authorised users and content. Encryption-Encryption process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. Anti virus- Anti-virus is a software that scans files or your computer's memory for certain patterns that may indicate an infection. The patterns it looks for are based on the signatures, or fingerprints, of known viruses.
  • 9.
    BACKUP-Producing back upof all the data in one of the reliable cloud service options. This way, in case the data is encrypted and stolen, one can restore it quickly from the cloud backups and get the operations up and running in no time. INSTALL CONTINOUS UPDATE
  • 10.