SlideShare a Scribd company logo




The protection of information systems
against unauthorized access to or
modification of information, whether in
storage, processing or transit, and against
the denial of service to authorized users or
the provision of service to unauthorized
users, including those measures necessary to
detect, document, and counter such threats
The result of any system of administrative
policies and procedures for identifying,
controlling, and protecting from
unauthorized disclosure, information the
protection of which is authorized by
executive order


Information Security Management provides:

- a systematic approach to achieving effective

information security within an organization;
- a realistic understanding of information security risks
and issues facing organizations; and
effective techniques for matching information security
requirements with business requirements.
- consists of various facets : security policy, risk analysis,
risk management, contingency planning, and disaster
recovery
Information Security Threats
Software agents and malicious code
Virus :
A program which gets executed when ever a
program is run on computer

Trojan Horse :
A program which does its supposed job but also
includes unsuspected and undesirable
functions. e. g. deletion of desirable items

Worm :
A self replicating program, creates its own
copies and executes, works in networks.
Information Security Threats
contd
Threats to Servers on Networks
Hackers have potential access to large systems
with prospects of security holes
Hackers use popular UNIX programs to discover
account names and guess passwords
Hackers can use electronic eavesdropping to
trap user and un-encrypted passwords
Hackers can spoof or configure a system to
mimic some other system
Security Architecture
Business
Data and application security
Network Security
Authentication and Authorization
Physical Security
Procedural Security

External World
Information Security Architecture
Information Security
Authentication Message received by B has
actually come from A

Confidentiality Message is secured and not seen
by any snooper

Integrity

Message has not been distorted by
accident or design

Non repudiation B can make A legally responsible
for the message
Information Security

A

B
A sends a message to B
Information Security contd
Encryption and Decryption Technology
Transfer Rs. 10,000 to the account of X
Encrypt
bjqhiudiiodo
Send
Decrypt

Receive

Transfer Rs. 10,000 to the account of X
Information Security contd
Symmetric Encryption :
The sender encrypts a message by using a secret key
and
the receiver uses the same key for decryption
Useful where two parties are well known
Difficulties in sharing the keys especially in large
networks

DATA ENCRYPTION STANDARD ( DES )
• Secret Key, Symmetric Encryption
• 56 bit secret key which means 2^56 possibilities
(56 Bit DES recently broken in a few hours, 128 bit Okay)
• Triple DES uses 112 bit key
• Bigger the bit size larger amount it takes for decryption
Information Security contd
Public and Private Key encryption
Message

Decrypted with B’s private key

B

A
Encrypted with B’s public
key

Message

Both parties have one public key and one private key each
The public keys are known to each other, Private key is not.
Message is encrypted using B’s public key
It can be opened only when B uses its private key
CONFIDENTIALITY IS ENSURED

RSA ( Rivest Shamir Adleman) algorithm for public key 768 bit
RSA considered safe presently
Information Security contd
Public and Private Key encryption
Message
Encrypted with B’s public key

A

Decrypted with
A’s public key and
B’s private key
Message

B

Encrypted with A’s private key

Message is encrypted using B’s public key.
The packet of the message encrypted with B’s public key is further
encrypted by A using A’s private key.
It can be opened only when B uses the public key of A and its own
private key
CONFIDENTIALITY AND AUTHENTICITY IS ENSURED
Information Security contd
Digital signature and public key encryption

Message
Digital Signature using A’s
private key

Encryption with A’s private key
Encrypted with B’s Public Key

Digital Signature A Sum check number called
finger print (like Message
Authentication Code (MAC) as
used in banking industry) which
is included in the message to
ensure INTEGRITY

CONFIDENTIALITY, INTEGRITY AND AUTHENTICITY ENSURED
BUT REPUDIATION POSSIBLE
Information Security

contd

Digital Certificate
Issued by Certifying Authority links
the person with his public and private
key Standard X.509

VERSION
Certificate Serial No.
Signature Algorithm ID.
ISSUER

C.A.PRIVATE
KEY

VALIDITY Period
Subject
Subject Public KEY INFO.
ISSUER Unique Identifier

GENERATE
DIGITAL
SIGNATURE

Subject Unique Identifier

Extensions
C.A.DIGITAL Signature
Information Security contd
Public Key Infrastructure
Set of agreed upon standards, certification
authorities, structure between multiple authorities,
methods to discover and validate certification
paths,operational protocols, management protocols,
inter operable tools and supporting legislature

PKI Issues : Regulation
• Governments are producing legislation to govern
e-commerce
• Who regulates Certification Authorities
• C A Liability
• Revocation of certificates
Internet Security
• Internet provides global reach at very low
cost and
high speed but is not secure due to its inherent
weakness in TCP/IP
• Growth of the Internet Exponential results in
a rise
of security incidents
• Most ISP and user organisations use public
domain
software such as LINUX, Apache for Internet
that
are more prone to security threads
• Default network OS setting and access to
Security Threats to Internet
Types of Attack
• Password - Based Attack
- cracking, FTP, Telnet, etc/password
• IP Spoofing
- TCP/IP allows anyone to generate a message
claiming to be another machine
• Session Hijacking
- special type of IP Spoofing which an intruder is
able to determine the sequence used between
two parties
• Network Snooping / Packet sniffing Packets can easily
be intercepted at any point in the network
Internet Security
Web
Network level - Firewall
server
FTP server

External
Users
Inside

Gopher
server

Inbound traffic from the Internet to the internal
network
Outbound traffic from the internal network
Inbound traffic from the Internet to public services
Internet Security
Technology
Operational Technology
•One-Time passwords
•Network Monitoring Tools
•Network Security Analysis Tools
•Firewalls

Cryptography Policy based Technology
•Digital Signature
•PKI Policy
Security Architecture
Network Security - Firewall

More Related Content

What's hot

Cybersecurity service provider
Cybersecurity service providerCybersecurity service provider
Cybersecurity service provider
Vishvendra Saini
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
osama elfar
 
3 f6 security
3 f6 security3 f6 security
3 f6 security
op205
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
 
Cryptographic Security
Cryptographic SecurityCryptographic Security
Cryptographic Security
jp tj
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
babak danyal
 
Intrusion in computing
Intrusion in computingIntrusion in computing
Intrusion in computing
Eduardo Cambinda
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
Shu Shin
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
STS
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
Nrapesh Shah
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
Ch01
Ch01Ch01
Data Network Security
Data Network SecurityData Network Security
Data Network Security
Atif Rehmat
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
Hem Pokhrel
 
Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System Security
Kiran Munir
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
Kerry Cole
 
CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
JeevananthamArumugam
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
limsh
 
this is test for today
this is test for todaythis is test for today
this is test for today
DreamMalar
 
Network security
Network securityNetwork security
Network security
fatimasaham
 

What's hot (20)

Cybersecurity service provider
Cybersecurity service providerCybersecurity service provider
Cybersecurity service provider
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
3 f6 security
3 f6 security3 f6 security
3 f6 security
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Cryptographic Security
Cryptographic SecurityCryptographic Security
Cryptographic Security
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Intrusion in computing
Intrusion in computingIntrusion in computing
Intrusion in computing
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 
Network security
Network securityNetwork security
Network security
 
Ch01
Ch01Ch01
Ch01
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System Security
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
Network security
Network securityNetwork security
Network security
 

Viewers also liked

Joint ventures and strategic alliances
Joint ventures and strategic alliancesJoint ventures and strategic alliances
Joint ventures and strategic alliances
Amit Fogla
 
Operationsmanagement 919slidespresentation-090928145353-phpapp01
Operationsmanagement 919slidespresentation-090928145353-phpapp01Operationsmanagement 919slidespresentation-090928145353-phpapp01
Operationsmanagement 919slidespresentation-090928145353-phpapp01
Amit Fogla
 
Business Opportunity Presentation
Business Opportunity PresentationBusiness Opportunity Presentation
Business Opportunity Presentation
porkyhawkins
 
S4 starmatching
S4 starmatchingS4 starmatching
S4 starmatching
Anurukku Khamkliang
 
CII continuous improvement aug13
CII continuous improvement aug13CII continuous improvement aug13
CII continuous improvement aug13
Subhash Khare
 
Mis jaiswal-chapter-09
Mis jaiswal-chapter-09Mis jaiswal-chapter-09
Mis jaiswal-chapter-09
Amit Fogla
 
Selenium私房菜(新手入门教程)
Selenium私房菜(新手入门教程)Selenium私房菜(新手入门教程)
Selenium私房菜(新手入门教程)bwgang
 
Aditya birla
Aditya birlaAditya birla
Aditya birla
Amit Fogla
 
Chapter 20 hr new
Chapter 20   hr newChapter 20   hr new
Chapter 20 hr new
Amit Fogla
 

Viewers also liked (9)

Joint ventures and strategic alliances
Joint ventures and strategic alliancesJoint ventures and strategic alliances
Joint ventures and strategic alliances
 
Operationsmanagement 919slidespresentation-090928145353-phpapp01
Operationsmanagement 919slidespresentation-090928145353-phpapp01Operationsmanagement 919slidespresentation-090928145353-phpapp01
Operationsmanagement 919slidespresentation-090928145353-phpapp01
 
Business Opportunity Presentation
Business Opportunity PresentationBusiness Opportunity Presentation
Business Opportunity Presentation
 
S4 starmatching
S4 starmatchingS4 starmatching
S4 starmatching
 
CII continuous improvement aug13
CII continuous improvement aug13CII continuous improvement aug13
CII continuous improvement aug13
 
Mis jaiswal-chapter-09
Mis jaiswal-chapter-09Mis jaiswal-chapter-09
Mis jaiswal-chapter-09
 
Selenium私房菜(新手入门教程)
Selenium私房菜(新手入门教程)Selenium私房菜(新手入门教程)
Selenium私房菜(新手入门教程)
 
Aditya birla
Aditya birlaAditya birla
Aditya birla
 
Chapter 20 hr new
Chapter 20   hr newChapter 20   hr new
Chapter 20 hr new
 

Similar to Mis jaiswal-chapter-11

6 security
6 security6 security
6 security
valency paul
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
itrraincity
 
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsCybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Samuel862293
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
Erin Moore
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
RushikeshChikane2
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
Mohsin Ahmad
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
Mayank Kashyap
 
Protecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware AttacksProtecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware Attacks
Netop
 
Online security & encryption
Online security & encryptionOnline security & encryption
Online security & encryption
Qamar Farooq
 
Network Security
Network SecurityNetwork Security
Network Security
Manthan Gandhi
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
Rishav Gupta
 
cloud security.pptx
cloud security.pptxcloud security.pptx
cloud security.pptx
Nickjohn33
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
Chiheb Chebbi
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
Sripati Mahapatra
 
Internet Security
Internet SecurityInternet Security
Internet Security
JainamParikh3
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
Muhammad FAHAD
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 
ebusiness digital,E business signature .
ebusiness digital,E business signature .ebusiness digital,E business signature .
ebusiness digital,E business signature .
SowmyaSomu8
 

Similar to Mis jaiswal-chapter-11 (20)

6 security
6 security6 security
6 security
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsCybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Protecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware AttacksProtecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware Attacks
 
Online security & encryption
Online security & encryptionOnline security & encryption
Online security & encryption
 
Network Security
Network SecurityNetwork Security
Network Security
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
cloud security.pptx
cloud security.pptxcloud security.pptx
cloud security.pptx
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
ebusiness digital,E business signature .
ebusiness digital,E business signature .ebusiness digital,E business signature .
ebusiness digital,E business signature .
 

More from Amit Fogla

Section 3 chapter 21 - financial management - teaching aid
Section 3   chapter 21 - financial management - teaching aidSection 3   chapter 21 - financial management - teaching aid
Section 3 chapter 21 - financial management - teaching aid
Amit Fogla
 
Ppt01
Ppt01Ppt01
Ppt01
Amit Fogla
 
Erp overview
Erp overviewErp overview
Erp overview
Amit Fogla
 
Competitive strategies in different types of industries
Competitive strategies in different types of industriesCompetitive strategies in different types of industries
Competitive strategies in different types of industries
Amit Fogla
 
The new venture exploration plan
The new venture exploration planThe new venture exploration plan
The new venture exploration plan
Amit Fogla
 
Csr13 5(imple)
Csr13 5(imple)Csr13 5(imple)
Csr13 5(imple)
Amit Fogla
 
Session rural marketing final
Session rural marketing finalSession rural marketing final
Session rural marketing final
Amit Fogla
 
Student presentation
Student presentationStudent presentation
Student presentation
Amit Fogla
 
Mis jaiswal-chapter-13
Mis jaiswal-chapter-13Mis jaiswal-chapter-13
Mis jaiswal-chapter-13
Amit Fogla
 
Environmental analysis
Environmental analysisEnvironmental analysis
Environmental analysis
Amit Fogla
 
Chapter37 internationalfinancialmanagement
Chapter37 internationalfinancialmanagementChapter37 internationalfinancialmanagement
Chapter37 internationalfinancialmanagement
Amit Fogla
 
Mis jaiswal-chapter-05
Mis jaiswal-chapter-05Mis jaiswal-chapter-05
Mis jaiswal-chapter-05
Amit Fogla
 
Mis jaiswal-chapter-10
Mis jaiswal-chapter-10Mis jaiswal-chapter-10
Mis jaiswal-chapter-10
Amit Fogla
 
Mis jaiswal-chapter-03
Mis jaiswal-chapter-03Mis jaiswal-chapter-03
Mis jaiswal-chapter-03
Amit Fogla
 
Mis jaiswal-chapter-04
Mis jaiswal-chapter-04Mis jaiswal-chapter-04
Mis jaiswal-chapter-04
Amit Fogla
 
Mis jaiswal-chapter-12
Mis jaiswal-chapter-12Mis jaiswal-chapter-12
Mis jaiswal-chapter-12
Amit Fogla
 
Mis jaiswal-chapter-08
Mis jaiswal-chapter-08Mis jaiswal-chapter-08
Mis jaiswal-chapter-08
Amit Fogla
 
Ecf
EcfEcf
Mis jaiswal-chapter-06
Mis jaiswal-chapter-06Mis jaiswal-chapter-06
Mis jaiswal-chapter-06
Amit Fogla
 
Mis jaiswal-chapter-02
Mis jaiswal-chapter-02Mis jaiswal-chapter-02
Mis jaiswal-chapter-02
Amit Fogla
 

More from Amit Fogla (20)

Section 3 chapter 21 - financial management - teaching aid
Section 3   chapter 21 - financial management - teaching aidSection 3   chapter 21 - financial management - teaching aid
Section 3 chapter 21 - financial management - teaching aid
 
Ppt01
Ppt01Ppt01
Ppt01
 
Erp overview
Erp overviewErp overview
Erp overview
 
Competitive strategies in different types of industries
Competitive strategies in different types of industriesCompetitive strategies in different types of industries
Competitive strategies in different types of industries
 
The new venture exploration plan
The new venture exploration planThe new venture exploration plan
The new venture exploration plan
 
Csr13 5(imple)
Csr13 5(imple)Csr13 5(imple)
Csr13 5(imple)
 
Session rural marketing final
Session rural marketing finalSession rural marketing final
Session rural marketing final
 
Student presentation
Student presentationStudent presentation
Student presentation
 
Mis jaiswal-chapter-13
Mis jaiswal-chapter-13Mis jaiswal-chapter-13
Mis jaiswal-chapter-13
 
Environmental analysis
Environmental analysisEnvironmental analysis
Environmental analysis
 
Chapter37 internationalfinancialmanagement
Chapter37 internationalfinancialmanagementChapter37 internationalfinancialmanagement
Chapter37 internationalfinancialmanagement
 
Mis jaiswal-chapter-05
Mis jaiswal-chapter-05Mis jaiswal-chapter-05
Mis jaiswal-chapter-05
 
Mis jaiswal-chapter-10
Mis jaiswal-chapter-10Mis jaiswal-chapter-10
Mis jaiswal-chapter-10
 
Mis jaiswal-chapter-03
Mis jaiswal-chapter-03Mis jaiswal-chapter-03
Mis jaiswal-chapter-03
 
Mis jaiswal-chapter-04
Mis jaiswal-chapter-04Mis jaiswal-chapter-04
Mis jaiswal-chapter-04
 
Mis jaiswal-chapter-12
Mis jaiswal-chapter-12Mis jaiswal-chapter-12
Mis jaiswal-chapter-12
 
Mis jaiswal-chapter-08
Mis jaiswal-chapter-08Mis jaiswal-chapter-08
Mis jaiswal-chapter-08
 
Ecf
EcfEcf
Ecf
 
Mis jaiswal-chapter-06
Mis jaiswal-chapter-06Mis jaiswal-chapter-06
Mis jaiswal-chapter-06
 
Mis jaiswal-chapter-02
Mis jaiswal-chapter-02Mis jaiswal-chapter-02
Mis jaiswal-chapter-02
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 

Mis jaiswal-chapter-11

  • 1.
  • 2.   The protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats The result of any system of administrative policies and procedures for identifying, controlling, and protecting from unauthorized disclosure, information the protection of which is authorized by executive order
  • 3.  Information Security Management provides: - a systematic approach to achieving effective information security within an organization; - a realistic understanding of information security risks and issues facing organizations; and effective techniques for matching information security requirements with business requirements. - consists of various facets : security policy, risk analysis, risk management, contingency planning, and disaster recovery
  • 4. Information Security Threats Software agents and malicious code Virus : A program which gets executed when ever a program is run on computer Trojan Horse : A program which does its supposed job but also includes unsuspected and undesirable functions. e. g. deletion of desirable items Worm : A self replicating program, creates its own copies and executes, works in networks.
  • 5. Information Security Threats contd Threats to Servers on Networks Hackers have potential access to large systems with prospects of security holes Hackers use popular UNIX programs to discover account names and guess passwords Hackers can use electronic eavesdropping to trap user and un-encrypted passwords Hackers can spoof or configure a system to mimic some other system
  • 6. Security Architecture Business Data and application security Network Security Authentication and Authorization Physical Security Procedural Security External World
  • 7. Information Security Architecture Information Security Authentication Message received by B has actually come from A Confidentiality Message is secured and not seen by any snooper Integrity Message has not been distorted by accident or design Non repudiation B can make A legally responsible for the message
  • 9. Information Security contd Encryption and Decryption Technology Transfer Rs. 10,000 to the account of X Encrypt bjqhiudiiodo Send Decrypt Receive Transfer Rs. 10,000 to the account of X
  • 10. Information Security contd Symmetric Encryption : The sender encrypts a message by using a secret key and the receiver uses the same key for decryption Useful where two parties are well known Difficulties in sharing the keys especially in large networks DATA ENCRYPTION STANDARD ( DES ) • Secret Key, Symmetric Encryption • 56 bit secret key which means 2^56 possibilities (56 Bit DES recently broken in a few hours, 128 bit Okay) • Triple DES uses 112 bit key • Bigger the bit size larger amount it takes for decryption
  • 11. Information Security contd Public and Private Key encryption Message Decrypted with B’s private key B A Encrypted with B’s public key Message Both parties have one public key and one private key each The public keys are known to each other, Private key is not. Message is encrypted using B’s public key It can be opened only when B uses its private key CONFIDENTIALITY IS ENSURED RSA ( Rivest Shamir Adleman) algorithm for public key 768 bit RSA considered safe presently
  • 12. Information Security contd Public and Private Key encryption Message Encrypted with B’s public key A Decrypted with A’s public key and B’s private key Message B Encrypted with A’s private key Message is encrypted using B’s public key. The packet of the message encrypted with B’s public key is further encrypted by A using A’s private key. It can be opened only when B uses the public key of A and its own private key CONFIDENTIALITY AND AUTHENTICITY IS ENSURED
  • 13. Information Security contd Digital signature and public key encryption Message Digital Signature using A’s private key Encryption with A’s private key Encrypted with B’s Public Key Digital Signature A Sum check number called finger print (like Message Authentication Code (MAC) as used in banking industry) which is included in the message to ensure INTEGRITY CONFIDENTIALITY, INTEGRITY AND AUTHENTICITY ENSURED BUT REPUDIATION POSSIBLE
  • 14. Information Security contd Digital Certificate Issued by Certifying Authority links the person with his public and private key Standard X.509 VERSION Certificate Serial No. Signature Algorithm ID. ISSUER C.A.PRIVATE KEY VALIDITY Period Subject Subject Public KEY INFO. ISSUER Unique Identifier GENERATE DIGITAL SIGNATURE Subject Unique Identifier Extensions C.A.DIGITAL Signature
  • 15. Information Security contd Public Key Infrastructure Set of agreed upon standards, certification authorities, structure between multiple authorities, methods to discover and validate certification paths,operational protocols, management protocols, inter operable tools and supporting legislature PKI Issues : Regulation • Governments are producing legislation to govern e-commerce • Who regulates Certification Authorities • C A Liability • Revocation of certificates
  • 16. Internet Security • Internet provides global reach at very low cost and high speed but is not secure due to its inherent weakness in TCP/IP • Growth of the Internet Exponential results in a rise of security incidents • Most ISP and user organisations use public domain software such as LINUX, Apache for Internet that are more prone to security threads • Default network OS setting and access to
  • 17. Security Threats to Internet Types of Attack • Password - Based Attack - cracking, FTP, Telnet, etc/password • IP Spoofing - TCP/IP allows anyone to generate a message claiming to be another machine • Session Hijacking - special type of IP Spoofing which an intruder is able to determine the sequence used between two parties • Network Snooping / Packet sniffing Packets can easily be intercepted at any point in the network
  • 18. Internet Security Web Network level - Firewall server FTP server External Users Inside Gopher server Inbound traffic from the Internet to the internal network Outbound traffic from the internal network Inbound traffic from the Internet to public services
  • 19. Internet Security Technology Operational Technology •One-Time passwords •Network Monitoring Tools •Network Security Analysis Tools •Firewalls Cryptography Policy based Technology •Digital Signature •PKI Policy