SlideShare a Scribd company logo
Security Management
 The goal of security
management is the
accuracy, integrity,
and safety of all
information system
processes and
resources
1Chapter 13 Security and Ethical Challenges
Internetworked Security Defenses
 Encryption
Data is transmitted in scrambled form
It is unscrambled by computer systems for
authorized users only
The most widely used method uses a pair of
public and private keys unique to each
individual
 Note: Each system has two keys public and private. Public is available to all. Suppose
computer 1 tries to communicate with computer 2 then it will encrypt message using public
key of computer 2. computer 2 will open it using its private key.
 Messages encrypted by public key will be opened by private key only and vice versa.
2Chapter 13 Security and Ethical Challenges
Public/Private Key Encryption
3Chapter 13 Security and Ethical Challenges
Internetworked Security Defenses
 Firewalls
A gatekeeper system that protects a
company’s intranets and other computer
networks from intrusion
Provides a filter and safe transfer point for
access to/from the Internet and other
networks
Important for individuals who connect to the
Internet with DSL or cable modems
Can deter hacking, but cannot prevent it
4Chapter 13 Security and Ethical Challenges
Internet and Intranet Firewalls
5Chapter 13 Security and Ethical Challenges
Denial of Service Attacks
 Denial of service attacks depend on three
layers of networked computer systems
The victim’s website
The victim’s Internet service provider
Zombie or slave computers that have been
commandeered by the cybercriminals. These
are mostly unguarded computers.
6Chapter 13 Security and Ethical Challenges
Defending Against Denial of Service
 At Zombie Machines
Set and enforce security policies
Scan for vulnerabilities
 At the ISP
Monitor and block traffic spikes
Traffic spikes are peak on web sites and often
causes crash. Content delivery** network kind
of distributed systems help in controlling traffic
 At the Victim’s Website
Create backup servers and network
connections
7Chapter 13 Security and Ethical Challenges
 A content delivery network (CDN) is a system of
distributed servers (network) that deliver
webpages and other Web content to a user
based on the geographic locations of the user.
The closer the CDN server is to the user
geographically, the faster the content will be
delivered to the user.
Chapter 13 Security and Ethical Challenges 8
Internetworked Security Defenses
 Email Monitoring
Use of content monitoring software that scans
for troublesome words that might compromise
corporate security
 Virus Defenses
Centralize the updating and distribution of
antivirus software
Use a security suite that integrates virus
protection with firewalls, Web security,
and content blocking features
9Chapter 13 Security and Ethical Challenges
Other Security Measures
 Security Codes
 Multilevel password system
 Encrypted passwords
 Smart cards with microprocessors
 Backup Files
 Duplicate files of data or programs
 Security Monitors
 Monitor the use of computers and networks
 Protects them from unauthorized use, fraud, and destruction
 Biometrics
 Computer devices measure physical traits that make each
individual unique
 Voice recognition, fingerprints, retina scan
10Chapter 13 Security and Ethical Challenges
 Computer Failure Controls
 Prevents computer failures or minimizes its effects
 Preventive maintenance
 Arrange backups with a disaster recovery organization
 Computer system fails because of electrical
supplies, telecommunication problems, virsuses,
Chapter 13 Security and Ethical Challenges 11
Other Security Measures
 In the event of a system failure, fault-tolerant systems have
redundant processors, peripherals, and software that provide
 Fail-over capability: shifts to back up components
 Fail-save capability: the system continues to operate at the
same level
 Fail-soft capability: the system continues to operate at a
reduced but acceptable level
 A disaster recovery plan contains formalized procedures to follow
in the event of a disaster
 Which employees will participate
 What their duties will be
 What hardware, software, and facilities will be used
 Priority of applications that will be processed
 Use of alternative facilities
 Offsite storage of databases
12Chapter 13 Security and Ethical Challenges
Information System Controls
 Methods and
devices that
attempt to
ensure the
accuracy,
validity, and
propriety of
information
system
activities
13Chapter 13 Security and Ethical Challenges
 Information system controls are methods and
devices that attempt to ensure the accuracy,
validity and propriety of information system
activities.
 Control total make total of all inputs OR outputs
 Checkpoints ensure that required information is
available for processing
 Hardware control is control of communication
between various parts of system. It is mostly job
of operating system.
Chapter 13 Security and Ethical Challenges 14
Auditing IT Security
 IT Security Audits
Performed by internal or external auditors
Review and evaluation of security measures
and management policies
Goal is to ensure that that proper and
adequate measures and policies are in place
15Chapter 13 Security and Ethical Challenges
Protecting Yourself from
Cybercrime
16Chapter 13 Security and Ethical Challenges
Chapter 13 Security and Ethical Challenges 17

More Related Content

What's hot

Desain dan analisis algoritma
Desain dan analisis algoritmaDesain dan analisis algoritma
Desain dan analisis algoritma
Diki Rosandy
 
PRESENTASI CYBERSECURITY REKTOR
PRESENTASI CYBERSECURITY REKTORPRESENTASI CYBERSECURITY REKTOR
PRESENTASI CYBERSECURITY REKTOR
Walid Umar
 
Analisa pengembangan sistem aplikasi krl access
Analisa pengembangan sistem aplikasi krl accessAnalisa pengembangan sistem aplikasi krl access
Analisa pengembangan sistem aplikasi krl access
Anisa Intan Damayanti
 
Perkembangan Komputer Dari Generasi Ke Generasi
Perkembangan Komputer Dari Generasi Ke GenerasiPerkembangan Komputer Dari Generasi Ke Generasi
Perkembangan Komputer Dari Generasi Ke Generasi
ShevaniaMeidika
 
Pertemuan 12 Algoritma Greedy
Pertemuan 12 Algoritma GreedyPertemuan 12 Algoritma Greedy
Pertemuan 12 Algoritma Greedy
Endang Retnoningsih
 
Laporan pendahuluan tibia
Laporan pendahuluan tibiaLaporan pendahuluan tibia
Laporan pendahuluan tibia
NurhikmaUmati
 
BAB 1 PENGERTIAN DASAR INFORMATIKA
BAB 1 PENGERTIAN DASAR INFORMATIKABAB 1 PENGERTIAN DASAR INFORMATIKA
BAB 1 PENGERTIAN DASAR INFORMATIKA
Sigit Pamujianakragiel AL Faridz
 
Analisis Algoritma - Notasi Asimptotik
Analisis Algoritma - Notasi AsimptotikAnalisis Algoritma - Notasi Asimptotik
Analisis Algoritma - Notasi Asimptotik
Adam Mukharil Bachtiar
 
Sistem informasi dalam organisasi
Sistem informasi dalam organisasiSistem informasi dalam organisasi
Sistem informasi dalam organisasi
yy rahmat
 
Basis data 5
Basis data 5Basis data 5
Basis data 5Febrienda
 
Contoh makalah "Virus Komputer"
Contoh makalah "Virus Komputer"Contoh makalah "Virus Komputer"
Contoh makalah "Virus Komputer"
PT serba gratiz
 
Keamanan sistem-operasi
Keamanan sistem-operasiKeamanan sistem-operasi
Keamanan sistem-operasi
Anin Rodahad
 
Sap perawatan kaki
Sap perawatan kakiSap perawatan kaki
Sap perawatan kaki
Novia Astuti
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Isni Wida
 
3. metodologi data science dts ta v.1
3. metodologi data science dts ta v.13. metodologi data science dts ta v.1
3. metodologi data science dts ta v.1
ArdianDwiPraba
 
Akhlak dan etika profesi
Akhlak dan etika profesiAkhlak dan etika profesi
Akhlak dan etika profesi
Fakta Wiguna
 
Ketoprak_PPT ADT Stack dan Queue.pptx
Ketoprak_PPT ADT Stack dan Queue.pptxKetoprak_PPT ADT Stack dan Queue.pptx
Ketoprak_PPT ADT Stack dan Queue.pptx
putii1
 
Project charter
Project charterProject charter
sejarah dan perkembangan imk
sejarah dan perkembangan imksejarah dan perkembangan imk
sejarah dan perkembangan imk
Wullan Juswita Sari
 

What's hot (20)

Desain dan analisis algoritma
Desain dan analisis algoritmaDesain dan analisis algoritma
Desain dan analisis algoritma
 
Iv. askep angina
Iv. askep anginaIv. askep angina
Iv. askep angina
 
PRESENTASI CYBERSECURITY REKTOR
PRESENTASI CYBERSECURITY REKTORPRESENTASI CYBERSECURITY REKTOR
PRESENTASI CYBERSECURITY REKTOR
 
Analisa pengembangan sistem aplikasi krl access
Analisa pengembangan sistem aplikasi krl accessAnalisa pengembangan sistem aplikasi krl access
Analisa pengembangan sistem aplikasi krl access
 
Perkembangan Komputer Dari Generasi Ke Generasi
Perkembangan Komputer Dari Generasi Ke GenerasiPerkembangan Komputer Dari Generasi Ke Generasi
Perkembangan Komputer Dari Generasi Ke Generasi
 
Pertemuan 12 Algoritma Greedy
Pertemuan 12 Algoritma GreedyPertemuan 12 Algoritma Greedy
Pertemuan 12 Algoritma Greedy
 
Laporan pendahuluan tibia
Laporan pendahuluan tibiaLaporan pendahuluan tibia
Laporan pendahuluan tibia
 
BAB 1 PENGERTIAN DASAR INFORMATIKA
BAB 1 PENGERTIAN DASAR INFORMATIKABAB 1 PENGERTIAN DASAR INFORMATIKA
BAB 1 PENGERTIAN DASAR INFORMATIKA
 
Analisis Algoritma - Notasi Asimptotik
Analisis Algoritma - Notasi AsimptotikAnalisis Algoritma - Notasi Asimptotik
Analisis Algoritma - Notasi Asimptotik
 
Sistem informasi dalam organisasi
Sistem informasi dalam organisasiSistem informasi dalam organisasi
Sistem informasi dalam organisasi
 
Basis data 5
Basis data 5Basis data 5
Basis data 5
 
Contoh makalah "Virus Komputer"
Contoh makalah "Virus Komputer"Contoh makalah "Virus Komputer"
Contoh makalah "Virus Komputer"
 
Keamanan sistem-operasi
Keamanan sistem-operasiKeamanan sistem-operasi
Keamanan sistem-operasi
 
Sap perawatan kaki
Sap perawatan kakiSap perawatan kaki
Sap perawatan kaki
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
3. metodologi data science dts ta v.1
3. metodologi data science dts ta v.13. metodologi data science dts ta v.1
3. metodologi data science dts ta v.1
 
Akhlak dan etika profesi
Akhlak dan etika profesiAkhlak dan etika profesi
Akhlak dan etika profesi
 
Ketoprak_PPT ADT Stack dan Queue.pptx
Ketoprak_PPT ADT Stack dan Queue.pptxKetoprak_PPT ADT Stack dan Queue.pptx
Ketoprak_PPT ADT Stack dan Queue.pptx
 
Project charter
Project charterProject charter
Project charter
 
sejarah dan perkembangan imk
sejarah dan perkembangan imksejarah dan perkembangan imk
sejarah dan perkembangan imk
 

Similar to Security

Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
Temesgen Berhanu
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
EMERSON EDUARDO RODRIGUES
 
Ijcatr04061002
Ijcatr04061002Ijcatr04061002
Ijcatr04061002
Editor IJCATR
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
ssuser6e8e41
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
Mohammad512578
 
Ancaman & kelemahan server
Ancaman & kelemahan serverAncaman & kelemahan server
Ancaman & kelemahan serverDedi Dwianto
 
Security and management
Security and managementSecurity and management
Security and management
ArtiSolanki5
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
amiyadutta
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
girmawodajo
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
Education
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
Wollo UNiversity
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
Khristine Botin
 
Security management(new) (1)
Security management(new) (1)Security management(new) (1)
Security management(new) (1)
Divyesh Chauhan
 
Module 5 security
Module 5   securityModule 5   security
Module 5 securityIT
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET Journal
 

Similar to Security (20)

Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Ijcatr04061002
Ijcatr04061002Ijcatr04061002
Ijcatr04061002
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Ancaman & kelemahan server
Ancaman & kelemahan serverAncaman & kelemahan server
Ancaman & kelemahan server
 
Security and management
Security and managementSecurity and management
Security and management
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
Security management(new) (1)
Security management(new) (1)Security management(new) (1)
Security management(new) (1)
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 

More from Dr. Vardhan choubey

Blueocean
BlueoceanBlueocean
Abell's 3 dimensions critical sucess factor-kpi
Abell's 3 dimensions critical sucess factor-kpiAbell's 3 dimensions critical sucess factor-kpi
Abell's 3 dimensions critical sucess factor-kpi
Dr. Vardhan choubey
 
Strategic management etop-porter five forces
Strategic management etop-porter five forcesStrategic management etop-porter five forces
Strategic management etop-porter five forces
Dr. Vardhan choubey
 
Outsourcing
OutsourcingOutsourcing
Outsourcing
Dr. Vardhan choubey
 
Newethics
NewethicsNewethics
Mis structure of digital firm
Mis structure of digital firmMis structure of digital firm
Mis structure of digital firm
Dr. Vardhan choubey
 
E business
E businessE business
Mis i unit
Mis i unitMis i unit
Basics of networking
Basics of networkingBasics of networking
Basics of networking
Dr. Vardhan choubey
 
Dss
DssDss
Geographical information System
Geographical information SystemGeographical information System
Geographical information System
Dr. Vardhan choubey
 
Executive support system
Executive support systemExecutive support system
Executive support system
Dr. Vardhan choubey
 
Expert system
Expert systemExpert system
Expert system
Dr. Vardhan choubey
 
Bi
BiBi
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
Dr. Vardhan choubey
 
System engineering analysis and design
System engineering analysis and designSystem engineering analysis and design
System engineering analysis and design
Dr. Vardhan choubey
 
Rad case
Rad caseRad case
Computer architecture
Computer architectureComputer architecture
Computer architecture
Dr. Vardhan choubey
 
Networktopology
NetworktopologyNetworktopology
Networktopology
Dr. Vardhan choubey
 
Network devices
Network devicesNetwork devices
Network devices
Dr. Vardhan choubey
 

More from Dr. Vardhan choubey (20)

Blueocean
BlueoceanBlueocean
Blueocean
 
Abell's 3 dimensions critical sucess factor-kpi
Abell's 3 dimensions critical sucess factor-kpiAbell's 3 dimensions critical sucess factor-kpi
Abell's 3 dimensions critical sucess factor-kpi
 
Strategic management etop-porter five forces
Strategic management etop-porter five forcesStrategic management etop-porter five forces
Strategic management etop-porter five forces
 
Outsourcing
OutsourcingOutsourcing
Outsourcing
 
Newethics
NewethicsNewethics
Newethics
 
Mis structure of digital firm
Mis structure of digital firmMis structure of digital firm
Mis structure of digital firm
 
E business
E businessE business
E business
 
Mis i unit
Mis i unitMis i unit
Mis i unit
 
Basics of networking
Basics of networkingBasics of networking
Basics of networking
 
Dss
DssDss
Dss
 
Geographical information System
Geographical information SystemGeographical information System
Geographical information System
 
Executive support system
Executive support systemExecutive support system
Executive support system
 
Expert system
Expert systemExpert system
Expert system
 
Bi
BiBi
Bi
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
System engineering analysis and design
System engineering analysis and designSystem engineering analysis and design
System engineering analysis and design
 
Rad case
Rad caseRad case
Rad case
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Networktopology
NetworktopologyNetworktopology
Networktopology
 
Network devices
Network devicesNetwork devices
Network devices
 

Recently uploaded

The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
HajeJanKamps
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
PaulBryant58
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Jos Voskuil
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
AUDIJEAngelo
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
Safe PaaS
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 

Recently uploaded (20)

The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 

Security

  • 1. Security Management  The goal of security management is the accuracy, integrity, and safety of all information system processes and resources 1Chapter 13 Security and Ethical Challenges
  • 2. Internetworked Security Defenses  Encryption Data is transmitted in scrambled form It is unscrambled by computer systems for authorized users only The most widely used method uses a pair of public and private keys unique to each individual  Note: Each system has two keys public and private. Public is available to all. Suppose computer 1 tries to communicate with computer 2 then it will encrypt message using public key of computer 2. computer 2 will open it using its private key.  Messages encrypted by public key will be opened by private key only and vice versa. 2Chapter 13 Security and Ethical Challenges
  • 3. Public/Private Key Encryption 3Chapter 13 Security and Ethical Challenges
  • 4. Internetworked Security Defenses  Firewalls A gatekeeper system that protects a company’s intranets and other computer networks from intrusion Provides a filter and safe transfer point for access to/from the Internet and other networks Important for individuals who connect to the Internet with DSL or cable modems Can deter hacking, but cannot prevent it 4Chapter 13 Security and Ethical Challenges
  • 5. Internet and Intranet Firewalls 5Chapter 13 Security and Ethical Challenges
  • 6. Denial of Service Attacks  Denial of service attacks depend on three layers of networked computer systems The victim’s website The victim’s Internet service provider Zombie or slave computers that have been commandeered by the cybercriminals. These are mostly unguarded computers. 6Chapter 13 Security and Ethical Challenges
  • 7. Defending Against Denial of Service  At Zombie Machines Set and enforce security policies Scan for vulnerabilities  At the ISP Monitor and block traffic spikes Traffic spikes are peak on web sites and often causes crash. Content delivery** network kind of distributed systems help in controlling traffic  At the Victim’s Website Create backup servers and network connections 7Chapter 13 Security and Ethical Challenges
  • 8.  A content delivery network (CDN) is a system of distributed servers (network) that deliver webpages and other Web content to a user based on the geographic locations of the user. The closer the CDN server is to the user geographically, the faster the content will be delivered to the user. Chapter 13 Security and Ethical Challenges 8
  • 9. Internetworked Security Defenses  Email Monitoring Use of content monitoring software that scans for troublesome words that might compromise corporate security  Virus Defenses Centralize the updating and distribution of antivirus software Use a security suite that integrates virus protection with firewalls, Web security, and content blocking features 9Chapter 13 Security and Ethical Challenges
  • 10. Other Security Measures  Security Codes  Multilevel password system  Encrypted passwords  Smart cards with microprocessors  Backup Files  Duplicate files of data or programs  Security Monitors  Monitor the use of computers and networks  Protects them from unauthorized use, fraud, and destruction  Biometrics  Computer devices measure physical traits that make each individual unique  Voice recognition, fingerprints, retina scan 10Chapter 13 Security and Ethical Challenges
  • 11.  Computer Failure Controls  Prevents computer failures or minimizes its effects  Preventive maintenance  Arrange backups with a disaster recovery organization  Computer system fails because of electrical supplies, telecommunication problems, virsuses, Chapter 13 Security and Ethical Challenges 11
  • 12. Other Security Measures  In the event of a system failure, fault-tolerant systems have redundant processors, peripherals, and software that provide  Fail-over capability: shifts to back up components  Fail-save capability: the system continues to operate at the same level  Fail-soft capability: the system continues to operate at a reduced but acceptable level  A disaster recovery plan contains formalized procedures to follow in the event of a disaster  Which employees will participate  What their duties will be  What hardware, software, and facilities will be used  Priority of applications that will be processed  Use of alternative facilities  Offsite storage of databases 12Chapter 13 Security and Ethical Challenges
  • 13. Information System Controls  Methods and devices that attempt to ensure the accuracy, validity, and propriety of information system activities 13Chapter 13 Security and Ethical Challenges
  • 14.  Information system controls are methods and devices that attempt to ensure the accuracy, validity and propriety of information system activities.  Control total make total of all inputs OR outputs  Checkpoints ensure that required information is available for processing  Hardware control is control of communication between various parts of system. It is mostly job of operating system. Chapter 13 Security and Ethical Challenges 14
  • 15. Auditing IT Security  IT Security Audits Performed by internal or external auditors Review and evaluation of security measures and management policies Goal is to ensure that that proper and adequate measures and policies are in place 15Chapter 13 Security and Ethical Challenges
  • 16. Protecting Yourself from Cybercrime 16Chapter 13 Security and Ethical Challenges
  • 17. Chapter 13 Security and Ethical Challenges 17