Group Members :
 Sebina Sebastian (P-40)
 Ashish Mathew (P-07)
 Tushar Pahurkar (P-48)
 Samiksha Thanekar (P-37)
 Ishan Mahadik (P-11)
What is Security?
Is the protection of assets. The three main aspects are:
•

Prevention

•

Detection

•

Re-action
Computer Security:
It deals with the prevention and detection of
unauthorised actions by users of a computer
system.
Information Security
 It is more than just protecting hardware and

software from being crashed
 It’s about protecting the information
resources that keep the company operating
 Goals are to ensure:
 Data integrity, availability and
confidentiality
 Business continuity
Risk
Risks and Threats
 Fraud
o Computer manipulation
o Damage or modification of computer data
 Service interruptions and

delays
 Intrusions
 Information manipulation
Risks and Threats
 Denial of service attacks

o Flood attack
o Ping attack
o SYN attack
o Teardrop attack

o Smurf attack
 Error

 Information theft
Risks and Threats
• Malicious software
o Trojan horse
o Worms

o Boot sector virus
• Web site defacements
Risks and Threats
 Extortion

 Sniffing
Risks and Threats
 Spoofing
Risks and Threats
 Con artists
 Phishing or Fishing
COMPUTER CRIMINALS
 Hacker
 Script kiddies
 Cyber-criminals
 Organized crime
COMPUTER CRIMINALS
 Terrorists

 Insiders
CIA triad
 Internal Controls
 Physical


Technical



Administrative
Technical Countermeasures
 Firewalls:
 Encryption/decryption
•

Virtual Private Networks (VPNs)
• Backup
Security’s Five Pillars

Non-repudiation

Integrity

Privacy

Identification

Authentication`
 Authentication
 Identification

 Privacy
 Integrity
 Non-repudiation
Conclusion
Security & Privacy of Information Technology

Security & Privacy of Information Technology