SlideShare a Scribd company logo
Managing IT
Security
AJAY JASSI
Security methods for
protecting IT systems and data
IT is one of the biggest and valuable industry.
There are many ways to protect computer systems and data in IT. These
will prevent the risk of something harmful to do be done.
Theses are some of the many ways to prevent this by having:
Backups
Password protections
Anti-virus software's
Updated software
Encryptions
Firewalls
Backups
Backups are very idle and are important, as it will protect the data from
getting lost if stolen or corrupted. It is also important that backups are
done regularly and daily so that no files and important data is at risk of
not being seen again.
Backups can stored online, on disc, on hdd and servers. A copy is more
secure being on site, than on the internet as there is less risk of it
getting accessed, as most businesses have a high amounts of IT based
security. However a backup is beneficially if stored online as well, as the
site maybe destroyed therefore backup cannot be assessable.
A storage unit/warehouse could also be used to store backup.
Password protection
User IDs and passwords is the simplest way to prevent data to get stolen
or copied in the workplace.
Passwords should have a variety of characters including numbers and
letters, so that this will ensure the password is strong.
The more stronger the password, the more harder it will be to find out.
Therefore it will be more secure.
In the IT industry passwords are changed regularly. Most organisations
change their passwords every month.
Passwords should be kept a secret and shouldn’t be obvious or easy to
guess. An example is someone's pet’s name or date of birth.
Anti-virus software
These software are used to detect viruses and malware. They also
remove them from the computer system, so that it doesn’t get harmed
or damaged.
It is important that full scans are run regularly so that it will reduce the
chance of viruses.
Full scans should be performed at least once a week, as in organisations
a lot of data is sent and received everyday.
This will maintain the internet and computer system running smoothly.
Updated software
Updating software is important as bugs and errors are fixed. Theses
fixes may have added more security features.
Updates are created mainly to stop patches from being cracked/hacked.
This is normally done by users whom download these software illegally
and don’t agree to pay for a licence or subscription.
Updated software can also remove unwanted threats to the computer
which will increase the performance and security.
Encryptions
This is used to scramble up words and numbers that want to be kept a
secret from others.
These contain the original message, with a large amount of numbers and
symbols added.
The encryptions are known by users in the organisation and is kept privately
between each other, so that messages are not spread to everyone.
Encryptions are very hard to crack, that’s why it is used and user don’t
bother cracking them as it isn’t worth it, as continental private information
isn’t shared on there.
An example of this is shown below, it is meant to say: Security is very
important.
E3cmeR9sUrK8ge+uF7ERUm6P4/FI7MTQeOHUoepGkrQ=(this is basic
encryption)
Firewalls
These are used to manage the organisations internet. It is a form of a
program, where settings and features on the internet can be edited and
changed.
An example of this is at a school, the network will block inappropriate
sites, and games.
Firewall also protects computer systems and networks from being
hacked from other users outside of the organisation.
All home PC’s and networks all should have an active firewall, to stay
safe.
Security improvements
Not only simple things can be done to protect the data and computer
system, but more can be done to secure things even more.
Things to take in consideration is physical ways to keep the organisation
secure from having stolen or damaged computer systems and data.
This can be things such as:
Securing computers to the desk and floor
Having CCTV cameras
Having security passes to enter and leave building site
Locking rooms when not in use
Having windows closed and use bars across them
Positioning equipment so it can’t be seen by others outside the site
Lock down systems
From having the computer systems attached to a surface, this will make
it harder for a thief to steal and will give time for security or the police
to catch them as more noise is being made from the struggle and
prevent the data and system form being stolen.
Also if people are aware that the computer systems are secured well on
the floor, they wouldn’t attempt to steal, as they know it’s time
consuming, difficult and noisy to break.
CCTV cameras
From having these the business will be able to look at everything that is
happening on the site with 24/7 recordings. This will help the business
spot any threats to the systems and data and will allow them to respond
quicker.
However people are aware of the CCTV as a responsibility for the
employer is to warn people they may be recorded. This is done by
displaying clear writing and posters around the site.
Although people look out for cameras, and look for areas where there
aren’t any visible, but are actually disguised or hidden for crime and
theft purposes. This is the main cause thief's get caught.
Security passes
Theses are used to stop people from entering the site through
entrances, as they can easily disguise themselves as an employee by
wearing similar or the same clothing.
This is a form of identity in the business by using photographs and
special codes in the card. These cards can either be electronically used
or physically used by security checking it is the correct employee with
their card.
Locks on doors
To keep a business secure it’s ideal for the employer to setup a lock
system when the rooms are not in use. This could be done manually or
automatically, either by security systems or employees.
The common way is manually done by employees as security systems
are expensive and requires a lot of maintenance.
There is a number of different types of locks which is electronically used
or physically used. An example is using a key or using a fingerprint
scanner.
Secured windows
This is used for extra protection towards visibility, safety and security
from theft.
Without these bars it is easy to smash through and climb in depending
on window sizes, which in cases are normally big enough for someone
to climb in.
These are also used for protection against employees as there is always
danger around, therefore if a stone is thrown at the window there is a
likely chance of it hitting the bars.
It also makes it harder for people to see through the windows as mostly
all of it is covered.
Visibility angles
It is important to position valuables and data in a area where it cannot
be seen easily from the outside. This is so that people outside of the
business doesn’t know what's inside and where it is.
People seeing the systems and data will make their decision whether or
not to attempt to risk stealing it or damaging it. Likely in business, it is
updated with the latest facilities, which are obviously valuable and
expensive.
As seen in the image, this is position to place a computer system and
valuables as it can be seen easily from the outside.
How to respond to a breach
As soon as a breach is recognised, it is important to take action
immediately. The suitable parties should be alerted to help out in this
situation.
The first thing that should be done is disconnecting the network from
the user who affected or attempted breaching the system. Collect the
logs and preserve them for evidence and leave the security as it is for
proof of the breach until the case is closed.
Ensure that you record the details on the breach for further actions to
be taken. This may require the account numbers, full data tracks, and
encrypted data files.

More Related Content

What's hot

Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
Marc Vael
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Companydanielblander
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013
salleh1n
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
Jan Wong
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
Priscila Bernardes
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
Joel Cardella
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
Gurjit
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
belsis
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
davidcurriecia
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
Sandeep Taileng
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
SlideTeam
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
WeSecureApp
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
Ahmed Musaad
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
Evolve IP
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
dougfarre
 
User security awareness
User security awarenessUser security awareness
User security awareness
K. A. M Lutfullah
 

What's hot (20)

Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Company
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
User security awareness
User security awarenessUser security awareness
User security awareness
 

Similar to Managing IT Security

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
Ajay Jassi
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
Stackfield
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
Tabsheer Hasan
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
deanmtaylor1545
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limited
oomagoolies
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
now a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdfnow a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdf
sooryasalini
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
Mobeen Khan
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
CommLab India – Rapid eLearning Solutions
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
Mirza Ćutuk
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesKristin Helgeson
 
TECHNIQUES DATA PRO.pptx
TECHNIQUES DATA PRO.pptxTECHNIQUES DATA PRO.pptx
TECHNIQUES DATA PRO.pptx
HAFIDHISAIDI1
 
Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage Prevention
IRJET Journal
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security Protection
VTECH SOLUTION
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
Khawar Nehal khawar.nehal@atrc.net.pk
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information Systems
Simeon Ogao
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
Hokme
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data security
EffOne_Technologies
 

Similar to Managing IT Security (20)

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limited
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
now a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdfnow a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdf
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
TECHNIQUES DATA PRO.pptx
TECHNIQUES DATA PRO.pptxTECHNIQUES DATA PRO.pptx
TECHNIQUES DATA PRO.pptx
 
Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage Prevention
 
P3
P3P3
P3
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security Protection
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information Systems
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data security
 

More from Ajay Jassi

Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
Ajay Jassi
 
Testing software
Testing softwareTesting software
Testing software
Ajay Jassi
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
Ajay Jassi
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
Ajay Jassi
 
Software Licences
Software LicencesSoftware Licences
Software Licences
Ajay Jassi
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
Ajay Jassi
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
Ajay Jassi
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
Ajay Jassi
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
Ajay Jassi
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
Ajay Jassi
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the Precautions
Ajay Jassi
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
Ajay Jassi
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installation
Ajay Jassi
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer System
Ajay Jassi
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
Ajay Jassi
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
Ajay Jassi
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
Ajay Jassi
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
Ajay Jassi
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
Ajay Jassi
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
Ajay Jassi
 

More from Ajay Jassi (20)

Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 
Testing software
Testing softwareTesting software
Testing software
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
 
Software Licences
Software LicencesSoftware Licences
Software Licences
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the Precautions
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installation
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer System
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Managing IT Security

  • 2. Security methods for protecting IT systems and data IT is one of the biggest and valuable industry. There are many ways to protect computer systems and data in IT. These will prevent the risk of something harmful to do be done. Theses are some of the many ways to prevent this by having: Backups Password protections Anti-virus software's Updated software Encryptions Firewalls
  • 3. Backups Backups are very idle and are important, as it will protect the data from getting lost if stolen or corrupted. It is also important that backups are done regularly and daily so that no files and important data is at risk of not being seen again. Backups can stored online, on disc, on hdd and servers. A copy is more secure being on site, than on the internet as there is less risk of it getting accessed, as most businesses have a high amounts of IT based security. However a backup is beneficially if stored online as well, as the site maybe destroyed therefore backup cannot be assessable. A storage unit/warehouse could also be used to store backup.
  • 4. Password protection User IDs and passwords is the simplest way to prevent data to get stolen or copied in the workplace. Passwords should have a variety of characters including numbers and letters, so that this will ensure the password is strong. The more stronger the password, the more harder it will be to find out. Therefore it will be more secure. In the IT industry passwords are changed regularly. Most organisations change their passwords every month. Passwords should be kept a secret and shouldn’t be obvious or easy to guess. An example is someone's pet’s name or date of birth.
  • 5. Anti-virus software These software are used to detect viruses and malware. They also remove them from the computer system, so that it doesn’t get harmed or damaged. It is important that full scans are run regularly so that it will reduce the chance of viruses. Full scans should be performed at least once a week, as in organisations a lot of data is sent and received everyday. This will maintain the internet and computer system running smoothly.
  • 6. Updated software Updating software is important as bugs and errors are fixed. Theses fixes may have added more security features. Updates are created mainly to stop patches from being cracked/hacked. This is normally done by users whom download these software illegally and don’t agree to pay for a licence or subscription. Updated software can also remove unwanted threats to the computer which will increase the performance and security.
  • 7. Encryptions This is used to scramble up words and numbers that want to be kept a secret from others. These contain the original message, with a large amount of numbers and symbols added. The encryptions are known by users in the organisation and is kept privately between each other, so that messages are not spread to everyone. Encryptions are very hard to crack, that’s why it is used and user don’t bother cracking them as it isn’t worth it, as continental private information isn’t shared on there. An example of this is shown below, it is meant to say: Security is very important. E3cmeR9sUrK8ge+uF7ERUm6P4/FI7MTQeOHUoepGkrQ=(this is basic encryption)
  • 8. Firewalls These are used to manage the organisations internet. It is a form of a program, where settings and features on the internet can be edited and changed. An example of this is at a school, the network will block inappropriate sites, and games. Firewall also protects computer systems and networks from being hacked from other users outside of the organisation. All home PC’s and networks all should have an active firewall, to stay safe.
  • 9. Security improvements Not only simple things can be done to protect the data and computer system, but more can be done to secure things even more. Things to take in consideration is physical ways to keep the organisation secure from having stolen or damaged computer systems and data. This can be things such as: Securing computers to the desk and floor Having CCTV cameras Having security passes to enter and leave building site Locking rooms when not in use Having windows closed and use bars across them Positioning equipment so it can’t be seen by others outside the site
  • 10. Lock down systems From having the computer systems attached to a surface, this will make it harder for a thief to steal and will give time for security or the police to catch them as more noise is being made from the struggle and prevent the data and system form being stolen. Also if people are aware that the computer systems are secured well on the floor, they wouldn’t attempt to steal, as they know it’s time consuming, difficult and noisy to break.
  • 11. CCTV cameras From having these the business will be able to look at everything that is happening on the site with 24/7 recordings. This will help the business spot any threats to the systems and data and will allow them to respond quicker. However people are aware of the CCTV as a responsibility for the employer is to warn people they may be recorded. This is done by displaying clear writing and posters around the site. Although people look out for cameras, and look for areas where there aren’t any visible, but are actually disguised or hidden for crime and theft purposes. This is the main cause thief's get caught.
  • 12. Security passes Theses are used to stop people from entering the site through entrances, as they can easily disguise themselves as an employee by wearing similar or the same clothing. This is a form of identity in the business by using photographs and special codes in the card. These cards can either be electronically used or physically used by security checking it is the correct employee with their card.
  • 13. Locks on doors To keep a business secure it’s ideal for the employer to setup a lock system when the rooms are not in use. This could be done manually or automatically, either by security systems or employees. The common way is manually done by employees as security systems are expensive and requires a lot of maintenance. There is a number of different types of locks which is electronically used or physically used. An example is using a key or using a fingerprint scanner.
  • 14. Secured windows This is used for extra protection towards visibility, safety and security from theft. Without these bars it is easy to smash through and climb in depending on window sizes, which in cases are normally big enough for someone to climb in. These are also used for protection against employees as there is always danger around, therefore if a stone is thrown at the window there is a likely chance of it hitting the bars. It also makes it harder for people to see through the windows as mostly all of it is covered.
  • 15. Visibility angles It is important to position valuables and data in a area where it cannot be seen easily from the outside. This is so that people outside of the business doesn’t know what's inside and where it is. People seeing the systems and data will make their decision whether or not to attempt to risk stealing it or damaging it. Likely in business, it is updated with the latest facilities, which are obviously valuable and expensive. As seen in the image, this is position to place a computer system and valuables as it can be seen easily from the outside.
  • 16. How to respond to a breach As soon as a breach is recognised, it is important to take action immediately. The suitable parties should be alerted to help out in this situation. The first thing that should be done is disconnecting the network from the user who affected or attempted breaching the system. Collect the logs and preserve them for evidence and leave the security as it is for proof of the breach until the case is closed. Ensure that you record the details on the breach for further actions to be taken. This may require the account numbers, full data tracks, and encrypted data files.