SlideShare a Scribd company logo
MANAGING I.T SECURITY
By George Smith-Moore
WHAT WILL BE INCLUDED?
Different security measures for protecting data. I will also evaluate the different access control
methods for protecting I.T systems.
Sources:
http://ico.org.uk/for_organisations/data_protection/security_measures
http://oreilly.com/catalog/csb/chapter/ch03.html
https://sites.google.com/site/jimmyxu101/concepts/accesscontrol
WAYSTO PROTECT AN I.T SYSTEM
 Installing a firewall can block out hackers, whereas an anti-virus system can get rid
of those on your system, already.
 This, if kept up-to-date is an effective means of overall system security, from the
outside world.
 Unfortunately it cannot protect you against, internal theft from within the
business, for protection against this, a different security measure would have to
be put in place.
 Most anti-virus software also includes spyware removal, this would make sure no
hackers can unwittingly gather your, or your customers data.
WAYSTO PROTECT AN I.T SYSTEM
 Keeping software, which includes your OS, and internet browser, up-to-date.This
should fix any known bugs, and security flaws, which hackers may take advantage
of.
WAYSTO PROTECT AN I.T SYSTEM
 Only allowing staff access to the resources needed.
 This would minimise internal sabotage and theft, as the only data accessible is
that which is required for their job.
 Although this protects data to some extent, other ways, which include physically
sealing ports shut, but more on this is explained later.
WAYSTO PROTECT AN I.T SYSTEM
 If data has to be transferred, encrypt it!
 Using encryption helps prevent the use of the data from theft, so if data has to be
transferred via a USB media device, then encrypting the data is vital. It makes
data unreadable until decrypted.
WAYSTO PROTECT AN I.T SYSTEM
 In case of a server failure, have a backup.
 If data is lost, a backup copy that is recent, will render the attack pointless. But
make sure that you have the most recent version, so no data is lost.
WAYSTO PROTECT AN I.T SYSTEM
 Remove media correctly, make sure that all data removed is gone forever, for
instance, programs offer a secure way of deleting files. But another way is to
simply destroy the data at the source, the USB stick, or HDD, etc.
WAYSTO PROTECT AN I.T SYSTEM
 Staff is a big security flaw among businesses.This can be minimised by training
them, and treating them with respect so that they wouldn’t want to steal from
you.
 Staff can be trained to use a strong password, to not become susceptible to social
engineering, and to not be susceptible to spam emails, as these may contain
viruses.
 Physically stealing USB ports on the computers can stop
any unwanted theft, it is a last resort which does work!
ACCESS CONTROL METHODS
 Forcing password changes, and making them of suitable difficulty, with lower and
uppercase letters, numbers and symbols.
 If updated regularly, and being completely different, this can be a very effective
means of protection against hackers.
 This is a simple means of protection, and it should be vital and mandatory for
every business.
ACCESS CONTROL METHODS
 Administrator (Admin user) rights.
 By using the admin functionality (which is on most operating systems),
effectively; you can control and limit what the normal users of the system can and
can’t do.
 A basic example of this, is to stop them changing passwords, and settings; this
prevents potential system sabotage.
 If used in a server effectively, you can limit certain users to certain files, this is
described better on the next slide.
ACCESS CONTROL METHODS
 A server may have one of the two (or both) types of “access controls”.
Discretionary access controls.
Mandatory access controls.
 Discretionary access controls (DAC): It is called discretionary, because it is up to
the discretion of the author, as to whom he gives rites to the file(s). It gives certain
rights to certain users about whom can view and/or edit a document, etc.
 Mandatory access controls (MAC): gives a device a level of security, and only files
that they can access have the same security, it is done through a series of
blacklists and whitelists, it is then used further for each individual user on the
system.
 There aren’t without flaws though, the MAC setup is good for wired networks, but
wireless networks can still be tapped into by hackers, and they can mimic a
validated MAC through the registry (if using windows).
ACCESS CONTROL METHODS
 Using the systems architecture, you can prioritise amounts of RAM, for certain
tasks, “thus isolating privileged processes from non-privileged processes”.
 By doing so you can restrict access to parts of the system.
 Overall, all of the access control methodfs described here, should not be used
alone, and there are flaws to quite a few of them (which are stated where
necessary). For the business, lots of these methods should be used together, to
stop any potential attacks.

More Related Content

What's hot

Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 
System Security
System SecuritySystem Security
System Security
Reddhi Basu
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
Rahmat Suhatman
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki Verma
Wikki Verma
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
Education
 
system Security
system Security system Security
system Security
Gaurav Mishra
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
CAS
 
Operating system security
Operating system securityOperating system security
Operating system securitySarmad Makhdoom
 
System security
System securitySystem security
System security
ReachLocal Services India
 
Security
SecuritySecurity
Tips for Securing Your Workstation
Tips for Securing Your WorkstationTips for Securing Your Workstation
Tips for Securing Your Workstation
Brian Solomon, MBA
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information systemNimisha Walecha
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
RohitK71
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
MEN Mikro Elektronik GmbH
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them
Donald E. Hester
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
faraz hussain
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 

What's hot (20)

Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
System Security
System SecuritySystem Security
System Security
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki Verma
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
system Security
system Security system Security
system Security
 
Network security
Network securityNetwork security
Network security
 
Computer security
Computer securityComputer security
Computer security
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Operating system security
Operating system securityOperating system security
Operating system security
 
System security
System securitySystem security
System security
 
Security
SecuritySecurity
Security
 
Tips for Securing Your Workstation
Tips for Securing Your WorkstationTips for Securing Your Workstation
Tips for Securing Your Workstation
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 

Viewers also liked

Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breachesOriginalGSM
 
ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1
OriginalGSM
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2
OriginalGSM
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2
OriginalGSM
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
OriginalGSM
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
OriginalGSM
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1
OriginalGSM
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
OriginalGSM
 
ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2
OriginalGSM
 

Viewers also liked (14)

UNIT 2 M1
UNIT 2 M1UNIT 2 M1
UNIT 2 M1
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breaches
 
UNIT 2 P1
UNIT 2 P1UNIT 2 P1
UNIT 2 P1
 
ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2
 
UNIT 2 P6
UNIT 2 P6UNIT 2 P6
UNIT 2 P6
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
 
UNIT 2 P8
UNIT 2 P8UNIT 2 P8
UNIT 2 P8
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1
 
UNIT 2 P5
UNIT 2 P5UNIT 2 P5
UNIT 2 P5
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
 
ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2
 

Similar to Managing i.t security

Running head Assignment 1 Identifying Potential Malicious Attack.docx
Running head Assignment 1 Identifying Potential Malicious Attack.docxRunning head Assignment 1 Identifying Potential Malicious Attack.docx
Running head Assignment 1 Identifying Potential Malicious Attack.docx
susanschei
 
Is4560
Is4560Is4560
Is4560
Tara Hardin
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
Lana Sorrels
 
Insecurity vssut
Insecurity vssutInsecurity vssut
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
Mobeen Khan
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
Emmanuel Oshogwe Akpeokhai
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklistbackdoor
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
bartholomeocoombs
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
annette228280
 
Cyber security
Cyber securityCyber security
Cyber security
Nimesh Gajjar
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
Andrew Sispoidis
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
Mohammad512578
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
ahmed53254
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
gitagrimston
 
Security has been the number 1 issue for any IT industry and organiz.pdf
Security has been the number 1 issue for any IT industry and organiz.pdfSecurity has been the number 1 issue for any IT industry and organiz.pdf
Security has been the number 1 issue for any IT industry and organiz.pdf
anupambedcovers
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 

Similar to Managing i.t security (20)

Running head Assignment 1 Identifying Potential Malicious Attack.docx
Running head Assignment 1 Identifying Potential Malicious Attack.docxRunning head Assignment 1 Identifying Potential Malicious Attack.docx
Running head Assignment 1 Identifying Potential Malicious Attack.docx
 
Is4560
Is4560Is4560
Is4560
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
 
Security has been the number 1 issue for any IT industry and organiz.pdf
Security has been the number 1 issue for any IT industry and organiz.pdfSecurity has been the number 1 issue for any IT industry and organiz.pdf
Security has been the number 1 issue for any IT industry and organiz.pdf
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 

More from OriginalGSM

UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2
OriginalGSM
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2
OriginalGSM
 
Software preparation
Software preparationSoftware preparation
Software preparation
OriginalGSM
 
Personalising desktop
Personalising desktopPersonalising desktop
Personalising desktopOriginalGSM
 
Software licences
Software licencesSoftware licences
Software licencesOriginalGSM
 
Preperation for the installation of computer hardware
Preperation for the installation of computer hardwarePreperation for the installation of computer hardware
Preperation for the installation of computer hardware
OriginalGSM
 
Installation of a selected piece of hardware
Installation of a selected piece of hardwareInstallation of a selected piece of hardware
Installation of a selected piece of hardware
OriginalGSM
 
Problems of installation of hardware
Problems of installation of hardwareProblems of installation of hardware
Problems of installation of hardware
OriginalGSM
 
Installation of OS
Installation of OSInstallation of OS
Installation of OS
OriginalGSM
 
Building a computer virtual desktop computer components
Building a computer virtual desktop computer componentsBuilding a computer virtual desktop computer components
Building a computer virtual desktop computer components
OriginalGSM
 
Installation of wireless NIC software
Installation of wireless NIC softwareInstallation of wireless NIC software
Installation of wireless NIC software
OriginalGSM
 
OS comparison
OS comparisonOS comparison
OS comparison
OriginalGSM
 
Health and safety in the workplace.
Health and safety in the workplace.Health and safety in the workplace.
Health and safety in the workplace.
OriginalGSM
 

More from OriginalGSM (16)

UNTI 2 P7
UNTI 2 P7UNTI 2 P7
UNTI 2 P7
 
UNIT 2 P2
UNIT 2 P2UNIT 2 P2
UNIT 2 P2
 
UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2
 
Security plan
Security planSecurity plan
Security plan
 
Software preparation
Software preparationSoftware preparation
Software preparation
 
Personalising desktop
Personalising desktopPersonalising desktop
Personalising desktop
 
Software licences
Software licencesSoftware licences
Software licences
 
Preperation for the installation of computer hardware
Preperation for the installation of computer hardwarePreperation for the installation of computer hardware
Preperation for the installation of computer hardware
 
Installation of a selected piece of hardware
Installation of a selected piece of hardwareInstallation of a selected piece of hardware
Installation of a selected piece of hardware
 
Problems of installation of hardware
Problems of installation of hardwareProblems of installation of hardware
Problems of installation of hardware
 
Installation of OS
Installation of OSInstallation of OS
Installation of OS
 
Building a computer virtual desktop computer components
Building a computer virtual desktop computer componentsBuilding a computer virtual desktop computer components
Building a computer virtual desktop computer components
 
Installation of wireless NIC software
Installation of wireless NIC softwareInstallation of wireless NIC software
Installation of wireless NIC software
 
OS comparison
OS comparisonOS comparison
OS comparison
 
Health and safety in the workplace.
Health and safety in the workplace.Health and safety in the workplace.
Health and safety in the workplace.
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Managing i.t security

  • 1. MANAGING I.T SECURITY By George Smith-Moore
  • 2. WHAT WILL BE INCLUDED? Different security measures for protecting data. I will also evaluate the different access control methods for protecting I.T systems. Sources: http://ico.org.uk/for_organisations/data_protection/security_measures http://oreilly.com/catalog/csb/chapter/ch03.html https://sites.google.com/site/jimmyxu101/concepts/accesscontrol
  • 3. WAYSTO PROTECT AN I.T SYSTEM  Installing a firewall can block out hackers, whereas an anti-virus system can get rid of those on your system, already.  This, if kept up-to-date is an effective means of overall system security, from the outside world.  Unfortunately it cannot protect you against, internal theft from within the business, for protection against this, a different security measure would have to be put in place.  Most anti-virus software also includes spyware removal, this would make sure no hackers can unwittingly gather your, or your customers data.
  • 4. WAYSTO PROTECT AN I.T SYSTEM  Keeping software, which includes your OS, and internet browser, up-to-date.This should fix any known bugs, and security flaws, which hackers may take advantage of.
  • 5. WAYSTO PROTECT AN I.T SYSTEM  Only allowing staff access to the resources needed.  This would minimise internal sabotage and theft, as the only data accessible is that which is required for their job.  Although this protects data to some extent, other ways, which include physically sealing ports shut, but more on this is explained later.
  • 6. WAYSTO PROTECT AN I.T SYSTEM  If data has to be transferred, encrypt it!  Using encryption helps prevent the use of the data from theft, so if data has to be transferred via a USB media device, then encrypting the data is vital. It makes data unreadable until decrypted.
  • 7. WAYSTO PROTECT AN I.T SYSTEM  In case of a server failure, have a backup.  If data is lost, a backup copy that is recent, will render the attack pointless. But make sure that you have the most recent version, so no data is lost.
  • 8. WAYSTO PROTECT AN I.T SYSTEM  Remove media correctly, make sure that all data removed is gone forever, for instance, programs offer a secure way of deleting files. But another way is to simply destroy the data at the source, the USB stick, or HDD, etc.
  • 9. WAYSTO PROTECT AN I.T SYSTEM  Staff is a big security flaw among businesses.This can be minimised by training them, and treating them with respect so that they wouldn’t want to steal from you.  Staff can be trained to use a strong password, to not become susceptible to social engineering, and to not be susceptible to spam emails, as these may contain viruses.  Physically stealing USB ports on the computers can stop any unwanted theft, it is a last resort which does work!
  • 10. ACCESS CONTROL METHODS  Forcing password changes, and making them of suitable difficulty, with lower and uppercase letters, numbers and symbols.  If updated regularly, and being completely different, this can be a very effective means of protection against hackers.  This is a simple means of protection, and it should be vital and mandatory for every business.
  • 11. ACCESS CONTROL METHODS  Administrator (Admin user) rights.  By using the admin functionality (which is on most operating systems), effectively; you can control and limit what the normal users of the system can and can’t do.  A basic example of this, is to stop them changing passwords, and settings; this prevents potential system sabotage.  If used in a server effectively, you can limit certain users to certain files, this is described better on the next slide.
  • 12. ACCESS CONTROL METHODS  A server may have one of the two (or both) types of “access controls”. Discretionary access controls. Mandatory access controls.  Discretionary access controls (DAC): It is called discretionary, because it is up to the discretion of the author, as to whom he gives rites to the file(s). It gives certain rights to certain users about whom can view and/or edit a document, etc.  Mandatory access controls (MAC): gives a device a level of security, and only files that they can access have the same security, it is done through a series of blacklists and whitelists, it is then used further for each individual user on the system.  There aren’t without flaws though, the MAC setup is good for wired networks, but wireless networks can still be tapped into by hackers, and they can mimic a validated MAC through the registry (if using windows).
  • 13. ACCESS CONTROL METHODS  Using the systems architecture, you can prioritise amounts of RAM, for certain tasks, “thus isolating privileged processes from non-privileged processes”.  By doing so you can restrict access to parts of the system.  Overall, all of the access control methodfs described here, should not be used alone, and there are flaws to quite a few of them (which are stated where necessary). For the business, lots of these methods should be used together, to stop any potential attacks.