SlideShare a Scribd company logo
IT Security
SYSTEM
KNORD
CAROLINA CORREIA
FA B I E N N E P I M E N TA
KEY ASSETS




SYSTEM            DOOR ENTRANCE
                  PRINTER – UPLOAD FILES
KNORD             PRINTER – PRINT FILES

DOOR ENTRANCE

PRINTER –UPLOAD
FILES

PRINTER – PRINT
FILES

SECURITY POLICY
DOOR ENTRANCE




SYSTEM             CONFIDIENTIALITY
                   IN THIS CASE IT’S NOT NECESSARY
KNORD              INTEGRITY
DOOR ENTRANCE      ALSO NOT NECESSARY
PRINTER –UPLOAD
FILES              AVAILABILITY
                   THE DOORS MUST BE AVAILABLE 24H EVERYDAY
PRINTER – PRINT
FILES

SECURITY POLICY
DOOR ENTRANCE




SYSTEM            ACCOUNTABILITY AND AUTHENTICATION

KNORD             THE USER NEEDS TO AUTHENTICATE HIMSELF WITH A
                  PERSONAL IDENTIFICATION
DOOR ENTRANCE
                  NON-REPUDIATION
PRINTER –UPLOAD   TO OPEN THE DOOR THE USER NEEDS TO USE BOTH –
FILES             NON-PHYSICAL     AND    PHYSICAL  INFROMATION
                  (CARD+PINCODE) FORACORRECTLOGIN
PRINTER – PRINT
FILES

SECURITY POLICY
DOOR ENTRANCE




SYSTEM            THREATS
                  SOMEONE ENTERS THE ROOM WITHOUT PERMISSION;
KNORD             SOMEONE OPENS THE DOOR WITHOUT PERMISSION

DOOR ENTRANCE     VULNERABILITIES
                  MORE THAN ONE PERSON CAN ENTER THE ROOM ONCE
PRINTER –UPLOAD
FILES             THE DOOR IS OPEN

PRINTER – PRINT
                  IS THE THREAT LARGE?
FILES
                  YES. IT’S REALLY EASY TO ENTER IN THE ROOM AFTER
SECURITY POLICY   SOMEONE HAD OPENED THE DOOR
DOOR ENTRANCE




SYSTEM            CONTROLS
                  THERE IS NO CONTROL FOR THE NUMBER OF THE PEOPLE
KNORD             THAT ENTERS ONCE THE DOOR IS OPEN.

DOOR ENTRANCE     IS IT HARMFUL?
PRINTER –UPLOAD   NO, IT ISN’T.
FILES

PRINTER – PRINT
FILES

SECURITY POLICY
DOOR ENTRANCE




SYSTEM            ACTION PLAN
                  IF IT’S DETECTED THAT SOMEONE THAT IS NOT ALLOWED
KNORD             IS INSIDE THE ROOM, ALL PEOPLE INSIDE SHOULD BE
                  EVACUATED AND THE DOOR CLOSED
DOOR ENTRANCE

PRINTER –UPLOAD
FILES

PRINTER – PRINT
FILES

SECURITY POLICY
PRINTER – UPLOAD
                  FILES




SYSTEM            CONFIDIENTIALITY
                  ONLY THE USER CAN ACCESS HIS PERSONAL FILES
KNORD             INTEGRITY
DOOR ENTRANCE     ONLY IF THE USER CAN DELETE HIS PERSONAL FILES,
                  UNLESS THEY’RE ALREADY PRINTED
PRINTER –UPLOAD
FILES
                  AVAILABILITY
PRINTER – PRINT
                  THE FILES ARE AVAILABLE TO READ, WRITE AND DELETE
FILES
                  24H EVERYDAY
SECURITY POLICY
PRINTER – UPLOAD
                  FILES




SYSTEM            ACCOUNTABILITY
                  THE FILES UPLOADED ARE PRIVATE-SENSITIVE DATA AND
KNORD             ONLY PRINTABLE BY THE USER WHO UPLOAD THEM

DOOR ENTRANCE     AUTHENTICATION
                  THE USER NEEDS TO USE A LOGIN TO UPLOAD THE FILES
PRINTER –UPLOAD
FILES
                  NON-REPUDIATION
PRINTER – PRINT
                  TO UPLOAD FILES TO THE SERVER, THE USER NEEDS A
FILES
                  PERSONAL LOGIN
SECURITY POLICY
PRINTER – UPLOAD
                  FILES




SYSTEM            THREATS
                  SOMEONE ACCESSES THE FILES OF OTHER USER;
KNORD             VULNERABILITIES
DOOR ENTRANCE     WE DIDN’T FIND ANY VULNERABILITIES, BUT HACKING THE
                  SERVER IS ALWAYS A POSSIBILITY
PRINTER –UPLOAD
FILES
                  IS THE THREAT LARGE?
PRINTER – PRINT
                  NO, IT’S VERY SMALL BECAUSE ITS DIFFICULT ACCESS TO
FILES
                  THE SERVER
SECURITY POLICY
PRINTER – UPLOAD
                  FILES




SYSTEM            CONTROLS
                  THE PERSONAL LOGIN IS UNIQUE
KNORD             THE FILES ARE DELETED AFTER BEING PRINTED

DOOR ENTRANCE

PRINTER –UPLOAD   IS IT HARMFUL?
FILES             YES, BECAUSE THE PRIVACY       OF   THER PERSONAL
PRINTER – PRINT
                  DOCUMENTS IS VIOLATED
FILES

SECURITY POLICY
PRINTER – UPLOAD
                  FILES




SYSTEM            ACTION PLAN
                  IF A SECURITY BRIGDE IS DETECTED, ALL FILES ON THE
KNORD             SERVER ARE AUTOMATICALLY DELETED.

DOOR ENTRANCE

PRINTER –UPLOAD
FILES

PRINTER – PRINT
FILES

SECURITY POLICY
PRINTER – PRINT
                  FILES




SYSTEM            CONFIDIENTIALITY
                  ONLY THE USER CAN PRINT HIS PERSONAL FILES
KNORD             INTEGRITY
DOOR ENTRANCE     NOT APPLIED
PRINTER –UPLOAD
FILES             AVAILABILITY
                  THE FILES ON THE SERVER ARE AVAILABLE TO PRINT 24H
PRINTER – PRINT
FILES

SECURITY POLICY
PRINTER – PRINT
                  FILES




SYSTEM            ACCOUNTABILITY AND AUTHENTICATION
                  THE USER NEEDS TO USE HIS PERSONAL CARD TO ACCESS
KNORD             THE FILES TO PRINT

DOOR ENTRANCE     NON-REPUDIATION
                  THE USE OF A PERSONAL CARD BY THE USER
PRINTER –UPLOAD
FILES

PRINTER – PRINT
FILES

SECURITY POLICY
PRINTER – PRINT
                  FILES




SYSTEM            THREATS
                  SOMEONE PRINTS FILES OF OTHER USERS
KNORD             SOMEONE PRINTS FILES WITHOUT PAYING

DOOR ENTRANCE     VULNERABILITIES
PRINTER –UPLOAD   WITH THE USER'S CARD, ANYONE CAN PRINT HIS FILES
FILES             CONNECT THE PRINTER CABLE TO THE COMPUTER AND
                  DIRECTLY FROM THERE
PRINTER – PRINT
FILES             FIND THE IP ADDRESS OF THE PRINTER

SECURITY POLICY   IS THE THREAT LARGE?
                  YES, IT’S EASY TO STEAL A CARD
                  YES, IT’S EASY TO DISCONNECT AND CONNECT THE CABLE
                  MODERATELY, JUST FOR ADVANCED USERS
PRINTER – PRINT
                  FILES




SYSTEM            CONTROLS
                  THERE ISN’T CONTROL FOR THE USE OF THE CARD
KNORD             THERE ISN’T CONTROL FOR THE PRINTER'S CABLE
                  THERE ISN’T CONTROL TO HIDE THE PRINTER'S IP ADDRESS
DOOR ENTRANCE

PRINTER –UPLOAD   IS IT HARMFUL?
FILES             YES, BECAUSE THE PERSONAL DOCUMENTS CAN BE
PRINTER – PRINT
                  PRINTED BY OTHER USERS
FILES             NO, BECAUSE ITS FINANCIAL INJURY IS PRETTY SMALL

SECURITY POLICY
PRINTER – PRINT
                  FILES




SYSTEM            ACTION PLAN
                  IF A SECURITY BRIGDE IS DETECTED, ALL THE PRINTERS ARE
KNORD             AUTOMATICALLY SHUTTED OFF

DOOR ENTRANCE

PRINTER –UPLOAD
FILES

PRINTER – PRINT
FILES

SECURITY POLICY
SECURITY POLICY




SYSTEM            DOOR ENTRANCE
                  THERE SHOULD BE A LOG OF THE ENTRANCES IN THE
KNORD             ROOM
                  ONLY PEOPLE WITH THE RIGHT LOGIN COULD ACCESS THIS
DOOR ENTRANCE     LOG
                  THERE SHOULD BE CONTROL OVER THE NUMBER OF
PRINTER –UPLOAD
FILES             PEOPLE THAT ENTER WITH ONE CARD (EXAMPLE: A
                  SECURITY CAMERA)
PRINTER – PRINT
FILES

SECURITY POLICY
SECURITY POLICY




SYSTEM            PRINTER – UPLOAD FILES
                  WE THINK THAT THE PRINTERS SYSTEM, REGARDING FILE
KNORD             UPLOADING, IS IN A VERY GOOD PLACE, SO KNORD
                  SHOULD KEEP IT WORKING
DOOR ENTRANCE

PRINTER –UPLOAD
FILES

PRINTER – PRINT
FILES

SECURITY POLICY
SECURITY POLICY




SYSTEM            PRINTER – PRINT FILES
                  IT SHOULD BE REQUIRED TO TYPE THE PIN CODE ALONG
KNORD             WITH THE CARD IN ORDER TO PRINT THE FILES
                  THE PRINTER'S CABLE SHOULD BE LOCKED WITH A
DOOR ENTRANCE     PADLOCK
                  THE PRINTER'S IP ADDRESS SHOULD BE HIDDEN, ANYONE
PRINTER –UPLOAD
FILES             SHOULD BE ABLE TO PRINT WITHOUT THE USE OF A LOGIN

PRINTER – PRINT
FILES

SECURITY POLICY
QUESTIONS?

More Related Content

Viewers also liked

Loracwynaroctober29
Loracwynaroctober29Loracwynaroctober29
Loracwynaroctober29lcwynar
 
To friend สมบูร
To friend สมบูรTo friend สมบูร
To friend สมบูร
boybelle
 
Guia riesgos ambientales
Guia riesgos ambientalesGuia riesgos ambientales
Guia riesgos ambientales
Percy Veliz
 
BluLife VIP Lounge - Castello Toscana Lux A
BluLife VIP Lounge - Castello Toscana Lux ABluLife VIP Lounge - Castello Toscana Lux A
BluLife VIP Lounge - Castello Toscana Lux A
BluLife
 
Couture Speech Of Henderson, NV Shares A Case Based Approach to Teaching EBPo...
Couture Speech Of Henderson, NV Shares A Case Based Approach to Teaching EBPo...Couture Speech Of Henderson, NV Shares A Case Based Approach to Teaching EBPo...
Couture Speech Of Henderson, NV Shares A Case Based Approach to Teaching EBPo...
CoutureSpeech
 
Schallhorn Thesis
Schallhorn ThesisSchallhorn Thesis
Schallhorn Thesis
John Bouzis
 
Backup
BackupBackup
Calming_the_Explosive_Child.pdf
Calming_the_Explosive_Child.pdfCalming_the_Explosive_Child.pdf
Calming_the_Explosive_Child.pdf
Martin Young
 

Viewers also liked (9)

Loracwynaroctober29
Loracwynaroctober29Loracwynaroctober29
Loracwynaroctober29
 
To friend สมบูร
To friend สมบูรTo friend สมบูร
To friend สมบูร
 
Guia riesgos ambientales
Guia riesgos ambientalesGuia riesgos ambientales
Guia riesgos ambientales
 
BluLife VIP Lounge - Castello Toscana Lux A
BluLife VIP Lounge - Castello Toscana Lux ABluLife VIP Lounge - Castello Toscana Lux A
BluLife VIP Lounge - Castello Toscana Lux A
 
Couture Speech Of Henderson, NV Shares A Case Based Approach to Teaching EBPo...
Couture Speech Of Henderson, NV Shares A Case Based Approach to Teaching EBPo...Couture Speech Of Henderson, NV Shares A Case Based Approach to Teaching EBPo...
Couture Speech Of Henderson, NV Shares A Case Based Approach to Teaching EBPo...
 
Schallhorn Thesis
Schallhorn ThesisSchallhorn Thesis
Schallhorn Thesis
 
Backup
BackupBackup
Backup
 
Calming_the_Explosive_Child.pdf
Calming_the_Explosive_Child.pdfCalming_the_Explosive_Child.pdf
Calming_the_Explosive_Child.pdf
 
Fenomeni meteorologici
Fenomeni meteorologici Fenomeni meteorologici
Fenomeni meteorologici
 

Similar to Itsecurity finalproject

Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
AfiqEfendy Zaen
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1
abdifatah said
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
Ali Habeeb
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
Ali Habeeb
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpage
nakomuri
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
KongChunLeong1
 
WeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance frameworkWeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance framework
WeSecure
 
lec security
lec securitylec security
lec security
Engr. ZEESHAN QAISER
 
NIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxNIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptx
chandutidake
 
2.4.1 - Intro to Cyber Security for students.ppt
2.4.1 - Intro to Cyber Security for students.ppt2.4.1 - Intro to Cyber Security for students.ppt
2.4.1 - Intro to Cyber Security for students.ppt
rameshselvarajkkp
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
aissa benyahya
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
Sweta Leena Panda
 
23 computer security
23 computer security23 computer security
23 computer security
hafizhanif86
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
Rishabha Garg
 
sanfranAIG3
sanfranAIG3sanfranAIG3
basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.ppt
PawachMetharattanara
 
It security
It securityIt security
It security
avi2607
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
Vanipriya Sakthivel
 
Social engineering
Social engineering Social engineering
Social engineering
Abdelhamid Limami
 
Digital physical security[present]
Digital physical security[present]Digital physical security[present]
Digital physical security[present]
Zawawi Mohamad
 

Similar to Itsecurity finalproject (20)

Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpage
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
 
WeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance frameworkWeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance framework
 
lec security
lec securitylec security
lec security
 
NIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxNIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptx
 
2.4.1 - Intro to Cyber Security for students.ppt
2.4.1 - Intro to Cyber Security for students.ppt2.4.1 - Intro to Cyber Security for students.ppt
2.4.1 - Intro to Cyber Security for students.ppt
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
23 computer security
23 computer security23 computer security
23 computer security
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
sanfranAIG3
sanfranAIG3sanfranAIG3
sanfranAIG3
 
basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.ppt
 
It security
It securityIt security
It security
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
 
Social engineering
Social engineering Social engineering
Social engineering
 
Digital physical security[present]
Digital physical security[present]Digital physical security[present]
Digital physical security[present]
 

More from Fabienne Pimenta

Serious Game em contexto Formação
Serious Game em contexto FormaçãoSerious Game em contexto Formação
Serious Game em contexto Formação
Fabienne Pimenta
 
Apresentação tdi
Apresentação tdi Apresentação tdi
Apresentação tdi
Fabienne Pimenta
 
Apresentacao sti
Apresentacao stiApresentacao sti
Apresentacao sti
Fabienne Pimenta
 
Apresentação TDI
Apresentação TDI Apresentação TDI
Apresentação TDI
Fabienne Pimenta
 
Erg.cog
Erg.cogErg.cog
Apresentacao ICPM
Apresentacao  ICPMApresentacao  ICPM
Apresentacao ICPM
Fabienne Pimenta
 

More from Fabienne Pimenta (6)

Serious Game em contexto Formação
Serious Game em contexto FormaçãoSerious Game em contexto Formação
Serious Game em contexto Formação
 
Apresentação tdi
Apresentação tdi Apresentação tdi
Apresentação tdi
 
Apresentacao sti
Apresentacao stiApresentacao sti
Apresentacao sti
 
Apresentação TDI
Apresentação TDI Apresentação TDI
Apresentação TDI
 
Erg.cog
Erg.cogErg.cog
Erg.cog
 
Apresentacao ICPM
Apresentacao  ICPMApresentacao  ICPM
Apresentacao ICPM
 

Recently uploaded

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 

Recently uploaded (20)

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 

Itsecurity finalproject

  • 2. KEY ASSETS SYSTEM DOOR ENTRANCE PRINTER – UPLOAD FILES KNORD PRINTER – PRINT FILES DOOR ENTRANCE PRINTER –UPLOAD FILES PRINTER – PRINT FILES SECURITY POLICY
  • 3. DOOR ENTRANCE SYSTEM CONFIDIENTIALITY IN THIS CASE IT’S NOT NECESSARY KNORD INTEGRITY DOOR ENTRANCE ALSO NOT NECESSARY PRINTER –UPLOAD FILES AVAILABILITY THE DOORS MUST BE AVAILABLE 24H EVERYDAY PRINTER – PRINT FILES SECURITY POLICY
  • 4. DOOR ENTRANCE SYSTEM ACCOUNTABILITY AND AUTHENTICATION KNORD THE USER NEEDS TO AUTHENTICATE HIMSELF WITH A PERSONAL IDENTIFICATION DOOR ENTRANCE NON-REPUDIATION PRINTER –UPLOAD TO OPEN THE DOOR THE USER NEEDS TO USE BOTH – FILES NON-PHYSICAL AND PHYSICAL INFROMATION (CARD+PINCODE) FORACORRECTLOGIN PRINTER – PRINT FILES SECURITY POLICY
  • 5. DOOR ENTRANCE SYSTEM THREATS SOMEONE ENTERS THE ROOM WITHOUT PERMISSION; KNORD SOMEONE OPENS THE DOOR WITHOUT PERMISSION DOOR ENTRANCE VULNERABILITIES MORE THAN ONE PERSON CAN ENTER THE ROOM ONCE PRINTER –UPLOAD FILES THE DOOR IS OPEN PRINTER – PRINT IS THE THREAT LARGE? FILES YES. IT’S REALLY EASY TO ENTER IN THE ROOM AFTER SECURITY POLICY SOMEONE HAD OPENED THE DOOR
  • 6. DOOR ENTRANCE SYSTEM CONTROLS THERE IS NO CONTROL FOR THE NUMBER OF THE PEOPLE KNORD THAT ENTERS ONCE THE DOOR IS OPEN. DOOR ENTRANCE IS IT HARMFUL? PRINTER –UPLOAD NO, IT ISN’T. FILES PRINTER – PRINT FILES SECURITY POLICY
  • 7. DOOR ENTRANCE SYSTEM ACTION PLAN IF IT’S DETECTED THAT SOMEONE THAT IS NOT ALLOWED KNORD IS INSIDE THE ROOM, ALL PEOPLE INSIDE SHOULD BE EVACUATED AND THE DOOR CLOSED DOOR ENTRANCE PRINTER –UPLOAD FILES PRINTER – PRINT FILES SECURITY POLICY
  • 8. PRINTER – UPLOAD FILES SYSTEM CONFIDIENTIALITY ONLY THE USER CAN ACCESS HIS PERSONAL FILES KNORD INTEGRITY DOOR ENTRANCE ONLY IF THE USER CAN DELETE HIS PERSONAL FILES, UNLESS THEY’RE ALREADY PRINTED PRINTER –UPLOAD FILES AVAILABILITY PRINTER – PRINT THE FILES ARE AVAILABLE TO READ, WRITE AND DELETE FILES 24H EVERYDAY SECURITY POLICY
  • 9. PRINTER – UPLOAD FILES SYSTEM ACCOUNTABILITY THE FILES UPLOADED ARE PRIVATE-SENSITIVE DATA AND KNORD ONLY PRINTABLE BY THE USER WHO UPLOAD THEM DOOR ENTRANCE AUTHENTICATION THE USER NEEDS TO USE A LOGIN TO UPLOAD THE FILES PRINTER –UPLOAD FILES NON-REPUDIATION PRINTER – PRINT TO UPLOAD FILES TO THE SERVER, THE USER NEEDS A FILES PERSONAL LOGIN SECURITY POLICY
  • 10.
  • 11.
  • 12. PRINTER – UPLOAD FILES SYSTEM THREATS SOMEONE ACCESSES THE FILES OF OTHER USER; KNORD VULNERABILITIES DOOR ENTRANCE WE DIDN’T FIND ANY VULNERABILITIES, BUT HACKING THE SERVER IS ALWAYS A POSSIBILITY PRINTER –UPLOAD FILES IS THE THREAT LARGE? PRINTER – PRINT NO, IT’S VERY SMALL BECAUSE ITS DIFFICULT ACCESS TO FILES THE SERVER SECURITY POLICY
  • 13. PRINTER – UPLOAD FILES SYSTEM CONTROLS THE PERSONAL LOGIN IS UNIQUE KNORD THE FILES ARE DELETED AFTER BEING PRINTED DOOR ENTRANCE PRINTER –UPLOAD IS IT HARMFUL? FILES YES, BECAUSE THE PRIVACY OF THER PERSONAL PRINTER – PRINT DOCUMENTS IS VIOLATED FILES SECURITY POLICY
  • 14. PRINTER – UPLOAD FILES SYSTEM ACTION PLAN IF A SECURITY BRIGDE IS DETECTED, ALL FILES ON THE KNORD SERVER ARE AUTOMATICALLY DELETED. DOOR ENTRANCE PRINTER –UPLOAD FILES PRINTER – PRINT FILES SECURITY POLICY
  • 15. PRINTER – PRINT FILES SYSTEM CONFIDIENTIALITY ONLY THE USER CAN PRINT HIS PERSONAL FILES KNORD INTEGRITY DOOR ENTRANCE NOT APPLIED PRINTER –UPLOAD FILES AVAILABILITY THE FILES ON THE SERVER ARE AVAILABLE TO PRINT 24H PRINTER – PRINT FILES SECURITY POLICY
  • 16. PRINTER – PRINT FILES SYSTEM ACCOUNTABILITY AND AUTHENTICATION THE USER NEEDS TO USE HIS PERSONAL CARD TO ACCESS KNORD THE FILES TO PRINT DOOR ENTRANCE NON-REPUDIATION THE USE OF A PERSONAL CARD BY THE USER PRINTER –UPLOAD FILES PRINTER – PRINT FILES SECURITY POLICY
  • 17. PRINTER – PRINT FILES SYSTEM THREATS SOMEONE PRINTS FILES OF OTHER USERS KNORD SOMEONE PRINTS FILES WITHOUT PAYING DOOR ENTRANCE VULNERABILITIES PRINTER –UPLOAD WITH THE USER'S CARD, ANYONE CAN PRINT HIS FILES FILES CONNECT THE PRINTER CABLE TO THE COMPUTER AND DIRECTLY FROM THERE PRINTER – PRINT FILES FIND THE IP ADDRESS OF THE PRINTER SECURITY POLICY IS THE THREAT LARGE? YES, IT’S EASY TO STEAL A CARD YES, IT’S EASY TO DISCONNECT AND CONNECT THE CABLE MODERATELY, JUST FOR ADVANCED USERS
  • 18. PRINTER – PRINT FILES SYSTEM CONTROLS THERE ISN’T CONTROL FOR THE USE OF THE CARD KNORD THERE ISN’T CONTROL FOR THE PRINTER'S CABLE THERE ISN’T CONTROL TO HIDE THE PRINTER'S IP ADDRESS DOOR ENTRANCE PRINTER –UPLOAD IS IT HARMFUL? FILES YES, BECAUSE THE PERSONAL DOCUMENTS CAN BE PRINTER – PRINT PRINTED BY OTHER USERS FILES NO, BECAUSE ITS FINANCIAL INJURY IS PRETTY SMALL SECURITY POLICY
  • 19. PRINTER – PRINT FILES SYSTEM ACTION PLAN IF A SECURITY BRIGDE IS DETECTED, ALL THE PRINTERS ARE KNORD AUTOMATICALLY SHUTTED OFF DOOR ENTRANCE PRINTER –UPLOAD FILES PRINTER – PRINT FILES SECURITY POLICY
  • 20. SECURITY POLICY SYSTEM DOOR ENTRANCE THERE SHOULD BE A LOG OF THE ENTRANCES IN THE KNORD ROOM ONLY PEOPLE WITH THE RIGHT LOGIN COULD ACCESS THIS DOOR ENTRANCE LOG THERE SHOULD BE CONTROL OVER THE NUMBER OF PRINTER –UPLOAD FILES PEOPLE THAT ENTER WITH ONE CARD (EXAMPLE: A SECURITY CAMERA) PRINTER – PRINT FILES SECURITY POLICY
  • 21. SECURITY POLICY SYSTEM PRINTER – UPLOAD FILES WE THINK THAT THE PRINTERS SYSTEM, REGARDING FILE KNORD UPLOADING, IS IN A VERY GOOD PLACE, SO KNORD SHOULD KEEP IT WORKING DOOR ENTRANCE PRINTER –UPLOAD FILES PRINTER – PRINT FILES SECURITY POLICY
  • 22. SECURITY POLICY SYSTEM PRINTER – PRINT FILES IT SHOULD BE REQUIRED TO TYPE THE PIN CODE ALONG KNORD WITH THE CARD IN ORDER TO PRINT THE FILES THE PRINTER'S CABLE SHOULD BE LOCKED WITH A DOOR ENTRANCE PADLOCK THE PRINTER'S IP ADDRESS SHOULD BE HIDDEN, ANYONE PRINTER –UPLOAD FILES SHOULD BE ABLE TO PRINT WITHOUT THE USE OF A LOGIN PRINTER – PRINT FILES SECURITY POLICY