SlideShare a Scribd company logo
The University of New Mexico 
Top School in Noida 
© Copyright 1997, The University of New Mexico 
By: 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-2 
Security Fundamentals 
• What is security? 
• Why do I need security? 
• Levels of security 
• Some scenarios 
• Security Policy 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-3 
What is Security? 
• Procedures that protect 
– you, your employees, and your peers 
– Paper or electronic media 
– Hardware, software, and networks 
• Protect from damage, theft, or change 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-4 
What is Security? 
• Protect assets and resources against 
– Human error 
– Intruders from outside 
– Dishonest employees 
– Technical sabotage 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-5 
Why do I Need Security? 
• Typical bank robbery: $9000 
• Typical embezzlement or white collar crime: 
$25,000 
• Typical electronic crime: $650,000 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-6 
Why do I Need Security? 
• Name a company, its been broken into 
• What does this cost a year? (Estimate $5 billion) 
• 17% of US companies had losses due to lack of 
security 
• CERT reports a 77% increase in computer break-ins 
from 1994-1995 
• It is estimated that 85%-97% of computer 
intrusions go undetected School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-7 
Why do I Need Security? 
• Statistics (Who is breaking into you) 
– Current employees 81% 
– Former employees 6% 
– Outsiders 13% 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-8 
Why do I Need Security? 
• Statistics (What are they doing) 
– Alteration of information 12% 
– Theft of service 10% 
– Trespass 2% 
– Money theft 44% 
– Theft of information 16% 
– Damage to software 16% 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-9 
Why do I Need Security? 
• Statistics (Damage to data) 
– Dishonest employees 10% 
– Terrorism 3% 
– Technical sabotage 10% 
– Water 10% 
– Fire 15% 
– Human error 55% 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-10 
Why do I Need Security? 
• The growth of the internet and client/server 
applications has moved more business data onto 
the network. This means more to lose if that data 
is tampered with or stolen. 
• Internetworking is great for data sharing but 
decreases security. 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-11 
Why do I Need Security? 
• Protect yourself from an attack on your account or 
network 
• Protect others from being attacked by your account 
or network 
• Disaster recovery 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-12 
Levels of Security 
• The United States Department of Defense has 
defined 7 levels of computer OS security in a 
document known as the Trusted Computer 
Standards Evaluation Criteria. 
• The levels are used to define different levels of 
protection for hardware, software, and stored 
information. 
• The system is additive - higher ratings include the 
Sfucnhcotoiol.neadlihtyo loef. cthoem levels below.
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-13 
Levels of Security 
• D1 is the lowest form of security available and 
states that the system is untrusted 
• A D1 rating is never awarded because this is 
essentially no security at all 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-14 
Levels of Security 
• C1 is the lowest level of security. 
• The system has file and directory read and write 
controls and authentication through user login. 
However, root is considered an unsecure function 
and auditing (system logging) is not available. 
• Most Unix machines would be classified as C1. 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-15 
Levels of Security 
• C2 features an auditing function to record all 
security-related events and provides stronger 
protection on key system files, such as the 
password file. 
• Most Unix machines have the capability with 
addition of software to become C2 compliant. 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-16 
Levels of Security 
• B1 supports multi-level security, such as secret and 
top secret, and mandatory access control, which 
states that a user cannot change permissions on 
files or directories 
• B2 requires that every object and file be labeled 
according to its security level and that these labels 
change dynamically depending on what is being 
used. 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-17 
Levels of Security 
• B3 extends security levels down into the system 
hardware; for example, terminals can only connect 
through trusted cable paths and specialized system 
hardware to ensure there is no unauthorized access 
• A1 is the highest level of security validated 
through the Orange Book. The design must be 
mathematically verified; all hardware and software 
must have been protected during shipment to 
Spcrehvoeonlt. etadmhpoeleri.ncgo.m
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-18 
Types of Attacks? 
• A fire burned in an office. The fire destroyed all 
software, the computer, and most of the files. The 
office was that of the departmental administrator 
who did grades, budgets, and contract functions. 
• Prevention? 
• What to do? 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-19 
Disaster Recovery Plan 
• Backup policy 
• Steps to be taken when you have a disaster 
• Contact names 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-20 
Disaster Recovery (Backups) 
• Create a backup policy 
• There are 2 reasons to do backups 
– Recovery of accidentally deleted files 
– Disaster recovery 
• Follow your policy and take backups regularly. 
• Verify these backups at some interval. 
• Keep backups off-site 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-21 
Backups 
• Purchase good software and hardware for backups 
• Decide on which data to backup and on what 
interval 
• Get a routine 
– Daily, weekly, and monthly 
– Full and Incremental 
School.edhole.com
The University of New Mexico 
Disaster Recovery (Recovery) 
• What do you do when you have a major disaster? 
• Don’t panic 
• Remember you have good backups 
• Follow your plan (You did write up a plan for this 
© Copyright 1997, The University of New Mexico 
I-22 
right?) 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-23 
Types of Attacks? 
• In an open, well traveled, multi-cubicle office you 
have financial resource access that you must 
transfer to your network departmental computer. 
How do you perform your work on the mainframe, 
Novell and your PC while doing other clerical 
duties that often take you from your desk? 
• Without compromising your data? 
School.edhole.com
The University of New Mexico 
Protection from Theft or Change 
© Copyright 1997, The University of New Mexico 
I-24 
• Risks analysis 
• What are the potential risks? 
• Who wants to see this data? 
• Who wants to change this data? 
• Possible attacks from inside? 
• You must create a security policy! 
School.edhole.com
The University of New Mexico 
Protection from Theft or Change 
© Copyright 1997, The University of New Mexico 
I-25 
• Protect from the public wandering the area 
• Keep good passwords and screen savers with 
passwords 
School.edhole.com
The University of New Mexico 
© Copyright 1997, The University of New Mexico 
I-26 
Types of Attacks 
• Using commonly accessible hacker tools your 
password is guessed and somebody uses your 
account to then break into another account. 
• Prevention? 
• What to do? 
School.edhole.com

More Related Content

What's hot

Ofer Cohen - areas of expertise
Ofer Cohen - areas of expertiseOfer Cohen - areas of expertise
Ofer Cohen - areas of expertiseOfer JRL Cohen
 
Essential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityEssential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical Security
Precisely
 
My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015
Anwar F.A. Dafa-Alla
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
Dhani Ahmad
 
Technology Presentation - 2/11/2020
Technology Presentation - 2/11/2020Technology Presentation - 2/11/2020
Technology Presentation - 2/11/2020
Franklin Matters
 
OTechs Information Security Training Course
OTechs Information Security Training CourseOTechs Information Security Training Course
OTechs Information Security Training Course
Osman Suliman
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
rehamsamy0
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
Commonwealth Telecommunications Organisation
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
AIS Network
 
Ahmed emad
Ahmed emadAhmed emad
Ahmed emad
Ahmed Emad
 
cyber security notes
cyber security notescyber security notes
cyber security notes
SHIKHAJAIN163
 
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Tonex
 
Lesson 1
Lesson 1Lesson 1
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy Dguest34b014
 

What's hot (17)

Ofer Cohen - areas of expertise
Ofer Cohen - areas of expertiseOfer Cohen - areas of expertise
Ofer Cohen - areas of expertise
 
Essential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityEssential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical Security
 
My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Technology Presentation - 2/11/2020
Technology Presentation - 2/11/2020Technology Presentation - 2/11/2020
Technology Presentation - 2/11/2020
 
OTechs Information Security Training Course
OTechs Information Security Training CourseOTechs Information Security Training Course
OTechs Information Security Training Course
 
Resume - Miller, Christopher
Resume - Miller, ChristopherResume - Miller, Christopher
Resume - Miller, Christopher
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
 
Ahmed emad
Ahmed emadAhmed emad
Ahmed emad
 
cyber security notes
cyber security notescyber security notes
cyber security notes
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 

Similar to Top schools in noida

Network Security introduction.pdf
Network Security introduction.pdfNetwork Security introduction.pdf
Network Security introduction.pdf
ssuser3e6464
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
Investorideas.com
 
hacking and Computer viruses for Cyber Security
hacking and Computer viruses for Cyber Securityhacking and Computer viruses for Cyber Security
hacking and Computer viruses for Cyber Security
DrArunSinghChouhan
 
CCNA_Security_01.ppt
CCNA_Security_01.pptCCNA_Security_01.ppt
CCNA_Security_01.ppt
veracru1
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
Ahmed Habib
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewali raza
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
Kabul Education University
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
elmuhammadmuhammad
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mayankkumar167052
 
Information Security Concepts.pdf
Information Security Concepts.pdfInformation Security Concepts.pdf
Information Security Concepts.pdf
SameeraSarathchandra1
 
CYBER SECURITY 101.pptx
CYBER SECURITY 101.pptxCYBER SECURITY 101.pptx
CYBER SECURITY 101.pptx
TejasPathak29
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
Community Protection Forum
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
Kabul Education University
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
Rimurutempest594985
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
RECIPA
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
primeteacher32
 
Chapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxChapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptx
JhaiJhai6
 
ransome_case solved.pptx
ransome_case solved.pptxransome_case solved.pptx
ransome_case solved.pptx
radhika457461
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Kumawat Dharmpal
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
it160320737038
 

Similar to Top schools in noida (20)

Network Security introduction.pdf
Network Security introduction.pdfNetwork Security introduction.pdf
Network Security introduction.pdf
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
 
hacking and Computer viruses for Cyber Security
hacking and Computer viruses for Cyber Securityhacking and Computer viruses for Cyber Security
hacking and Computer viruses for Cyber Security
 
CCNA_Security_01.ppt
CCNA_Security_01.pptCCNA_Security_01.ppt
CCNA_Security_01.ppt
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Information Security Concepts.pdf
Information Security Concepts.pdfInformation Security Concepts.pdf
Information Security Concepts.pdf
 
CYBER SECURITY 101.pptx
CYBER SECURITY 101.pptxCYBER SECURITY 101.pptx
CYBER SECURITY 101.pptx
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
Chapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxChapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptx
 
ransome_case solved.pptx
ransome_case solved.pptxransome_case solved.pptx
ransome_case solved.pptx
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 

More from Edhole.com

Ca in patna
Ca in patnaCa in patna
Ca in patna
Edhole.com
 
Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarka
Edhole.com
 
Ca in dwarka
Ca in dwarkaCa in dwarka
Ca in dwarka
Edhole.com
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarka
Edhole.com
 
Website development company surat
Website development company suratWebsite development company surat
Website development company surat
Edhole.com
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in surat
Edhole.com
 
Website dsigning company in india
Website dsigning company in indiaWebsite dsigning company in india
Website dsigning company in india
Edhole.com
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhi
Edhole.com
 
Ca in patna
Ca in patnaCa in patna
Ca in patna
Edhole.com
 
Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarka
Edhole.com
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarka
Edhole.com
 
Ca in dwarka
Ca in dwarkaCa in dwarka
Ca in dwarka
Edhole.com
 
Website development company surat
Website development company suratWebsite development company surat
Website development company surat
Edhole.com
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in surat
Edhole.com
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in india
Edhole.com
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhi
Edhole.com
 
Website designing company in mumbai
Website designing company in mumbaiWebsite designing company in mumbai
Website designing company in mumbai
Edhole.com
 
Website development company surat
Website development company suratWebsite development company surat
Website development company surat
Edhole.com
 
Website desinging company in surat
Website desinging company in suratWebsite desinging company in surat
Website desinging company in surat
Edhole.com
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in india
Edhole.com
 

More from Edhole.com (20)

Ca in patna
Ca in patnaCa in patna
Ca in patna
 
Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarka
 
Ca in dwarka
Ca in dwarkaCa in dwarka
Ca in dwarka
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarka
 
Website development company surat
Website development company suratWebsite development company surat
Website development company surat
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in surat
 
Website dsigning company in india
Website dsigning company in indiaWebsite dsigning company in india
Website dsigning company in india
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhi
 
Ca in patna
Ca in patnaCa in patna
Ca in patna
 
Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarka
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarka
 
Ca in dwarka
Ca in dwarkaCa in dwarka
Ca in dwarka
 
Website development company surat
Website development company suratWebsite development company surat
Website development company surat
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in surat
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in india
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhi
 
Website designing company in mumbai
Website designing company in mumbaiWebsite designing company in mumbai
Website designing company in mumbai
 
Website development company surat
Website development company suratWebsite development company surat
Website development company surat
 
Website desinging company in surat
Website desinging company in suratWebsite desinging company in surat
Website desinging company in surat
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in india
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 

Top schools in noida

  • 1. The University of New Mexico Top School in Noida © Copyright 1997, The University of New Mexico By: School.edhole.com
  • 2. The University of New Mexico © Copyright 1997, The University of New Mexico I-2 Security Fundamentals • What is security? • Why do I need security? • Levels of security • Some scenarios • Security Policy School.edhole.com
  • 3. The University of New Mexico © Copyright 1997, The University of New Mexico I-3 What is Security? • Procedures that protect – you, your employees, and your peers – Paper or electronic media – Hardware, software, and networks • Protect from damage, theft, or change School.edhole.com
  • 4. The University of New Mexico © Copyright 1997, The University of New Mexico I-4 What is Security? • Protect assets and resources against – Human error – Intruders from outside – Dishonest employees – Technical sabotage School.edhole.com
  • 5. The University of New Mexico © Copyright 1997, The University of New Mexico I-5 Why do I Need Security? • Typical bank robbery: $9000 • Typical embezzlement or white collar crime: $25,000 • Typical electronic crime: $650,000 School.edhole.com
  • 6. The University of New Mexico © Copyright 1997, The University of New Mexico I-6 Why do I Need Security? • Name a company, its been broken into • What does this cost a year? (Estimate $5 billion) • 17% of US companies had losses due to lack of security • CERT reports a 77% increase in computer break-ins from 1994-1995 • It is estimated that 85%-97% of computer intrusions go undetected School.edhole.com
  • 7. The University of New Mexico © Copyright 1997, The University of New Mexico I-7 Why do I Need Security? • Statistics (Who is breaking into you) – Current employees 81% – Former employees 6% – Outsiders 13% School.edhole.com
  • 8. The University of New Mexico © Copyright 1997, The University of New Mexico I-8 Why do I Need Security? • Statistics (What are they doing) – Alteration of information 12% – Theft of service 10% – Trespass 2% – Money theft 44% – Theft of information 16% – Damage to software 16% School.edhole.com
  • 9. The University of New Mexico © Copyright 1997, The University of New Mexico I-9 Why do I Need Security? • Statistics (Damage to data) – Dishonest employees 10% – Terrorism 3% – Technical sabotage 10% – Water 10% – Fire 15% – Human error 55% School.edhole.com
  • 10. The University of New Mexico © Copyright 1997, The University of New Mexico I-10 Why do I Need Security? • The growth of the internet and client/server applications has moved more business data onto the network. This means more to lose if that data is tampered with or stolen. • Internetworking is great for data sharing but decreases security. School.edhole.com
  • 11. The University of New Mexico © Copyright 1997, The University of New Mexico I-11 Why do I Need Security? • Protect yourself from an attack on your account or network • Protect others from being attacked by your account or network • Disaster recovery School.edhole.com
  • 12. The University of New Mexico © Copyright 1997, The University of New Mexico I-12 Levels of Security • The United States Department of Defense has defined 7 levels of computer OS security in a document known as the Trusted Computer Standards Evaluation Criteria. • The levels are used to define different levels of protection for hardware, software, and stored information. • The system is additive - higher ratings include the Sfucnhcotoiol.neadlihtyo loef. cthoem levels below.
  • 13. The University of New Mexico © Copyright 1997, The University of New Mexico I-13 Levels of Security • D1 is the lowest form of security available and states that the system is untrusted • A D1 rating is never awarded because this is essentially no security at all School.edhole.com
  • 14. The University of New Mexico © Copyright 1997, The University of New Mexico I-14 Levels of Security • C1 is the lowest level of security. • The system has file and directory read and write controls and authentication through user login. However, root is considered an unsecure function and auditing (system logging) is not available. • Most Unix machines would be classified as C1. School.edhole.com
  • 15. The University of New Mexico © Copyright 1997, The University of New Mexico I-15 Levels of Security • C2 features an auditing function to record all security-related events and provides stronger protection on key system files, such as the password file. • Most Unix machines have the capability with addition of software to become C2 compliant. School.edhole.com
  • 16. The University of New Mexico © Copyright 1997, The University of New Mexico I-16 Levels of Security • B1 supports multi-level security, such as secret and top secret, and mandatory access control, which states that a user cannot change permissions on files or directories • B2 requires that every object and file be labeled according to its security level and that these labels change dynamically depending on what is being used. School.edhole.com
  • 17. The University of New Mexico © Copyright 1997, The University of New Mexico I-17 Levels of Security • B3 extends security levels down into the system hardware; for example, terminals can only connect through trusted cable paths and specialized system hardware to ensure there is no unauthorized access • A1 is the highest level of security validated through the Orange Book. The design must be mathematically verified; all hardware and software must have been protected during shipment to Spcrehvoeonlt. etadmhpoeleri.ncgo.m
  • 18. The University of New Mexico © Copyright 1997, The University of New Mexico I-18 Types of Attacks? • A fire burned in an office. The fire destroyed all software, the computer, and most of the files. The office was that of the departmental administrator who did grades, budgets, and contract functions. • Prevention? • What to do? School.edhole.com
  • 19. The University of New Mexico © Copyright 1997, The University of New Mexico I-19 Disaster Recovery Plan • Backup policy • Steps to be taken when you have a disaster • Contact names School.edhole.com
  • 20. The University of New Mexico © Copyright 1997, The University of New Mexico I-20 Disaster Recovery (Backups) • Create a backup policy • There are 2 reasons to do backups – Recovery of accidentally deleted files – Disaster recovery • Follow your policy and take backups regularly. • Verify these backups at some interval. • Keep backups off-site School.edhole.com
  • 21. The University of New Mexico © Copyright 1997, The University of New Mexico I-21 Backups • Purchase good software and hardware for backups • Decide on which data to backup and on what interval • Get a routine – Daily, weekly, and monthly – Full and Incremental School.edhole.com
  • 22. The University of New Mexico Disaster Recovery (Recovery) • What do you do when you have a major disaster? • Don’t panic • Remember you have good backups • Follow your plan (You did write up a plan for this © Copyright 1997, The University of New Mexico I-22 right?) School.edhole.com
  • 23. The University of New Mexico © Copyright 1997, The University of New Mexico I-23 Types of Attacks? • In an open, well traveled, multi-cubicle office you have financial resource access that you must transfer to your network departmental computer. How do you perform your work on the mainframe, Novell and your PC while doing other clerical duties that often take you from your desk? • Without compromising your data? School.edhole.com
  • 24. The University of New Mexico Protection from Theft or Change © Copyright 1997, The University of New Mexico I-24 • Risks analysis • What are the potential risks? • Who wants to see this data? • Who wants to change this data? • Possible attacks from inside? • You must create a security policy! School.edhole.com
  • 25. The University of New Mexico Protection from Theft or Change © Copyright 1997, The University of New Mexico I-25 • Protect from the public wandering the area • Keep good passwords and screen savers with passwords School.edhole.com
  • 26. The University of New Mexico © Copyright 1997, The University of New Mexico I-26 Types of Attacks • Using commonly accessible hacker tools your password is guessed and somebody uses your account to then break into another account. • Prevention? • What to do? School.edhole.com