SlideShare a Scribd company logo
1 of 17
INTRODUCTION TO INFORMATION  SYSTEMS SUPdeCO - PCM - English Track October 2008 Computer-Based Information Systems  Security PROF. DIANA MANGALAGIU MANAGEMENT AND STRATEGY DEPARTMENT
Concept of security «  The security of an information system is its non-vulnerability to accidents or deliberate attacks, that is the impossibility that those attacks have any serious impacts on the state and the operation of the system »  J. P. Magnier
Why security is a hot topic ,[object Object],[object Object],[object Object],[object Object]
General   definitions Un sinistre Causes of vulnerability Immediate and long-term effects An attack or a natural disaster Disaster : Source: P. Reix
S ecurity guidelines : To handle security, it should be assessed using indicators including: 1 – Availability  of information and functionalities 2 – Truthfulness  of information 3 –  Confidentiality  of information 4 –  Non-repudiation  of communications 5 –  Traceability  of operations Potential causes of the disaster   make it essential to keep watch over the vulnerability of the system and thus over the  risks  it runs. General   definitions
Causes of disasters ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security  planning Policies for security 1 – Material resource security 2 – Software security 3 – Application security 4 – General security steps 5 – Insurance The idea that security is entirely handled by hardware and software related procedures is a dangerous utopia as it must come with organizational thinking as well as awareness and training of individuals.
Four cornerstones of security & trust authentication integrity & non- authorisation confidentiality repudiation
Authentication ,[object Object],authentication
Integrity ,[object Object],authentication integrity
Non-repudiation ,[object Object],authentication integrity & non- repudiation
Confidentiality Only intended recipient can make sense of message or stored information authentication integrity & non- confidentiality repudiation
Authorisation Is the user allowed to perform these operations? authentication integrity & non- authorisation confidentiality repudiation
Security tradeoffs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Common web scenarios and their security aspects  Scenario 1: online banking ,[object Object],[object Object],[object Object],[object Object]
Scenario 2: Downloading code ,[object Object],[object Object],[object Object]
Scenario 3: online credit card transactions ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacksSugirtha Jasmine M
 
Cyber security
Cyber securityCyber security
Cyber securityEduonix
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015T. J. Saotome
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introductionAfna Crcs
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthIceQUICK
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Seqrite
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysisdadkhah077
 
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Ronan Martin
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attackisc2-hellenic
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Edureka!
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 

What's hot (20)

E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information security
Information securityInformation security
Information security
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
 
презентация1
презентация1презентация1
презентация1
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 

Viewers also liked

Presentacion house
Presentacion housePresentacion house
Presentacion housePakitalero
 
Revolução Digital Pós NRF 2016
Revolução Digital Pós NRF 2016Revolução Digital Pós NRF 2016
Revolução Digital Pós NRF 2016Ricardo Kubo
 
Visiting Places
Visiting PlacesVisiting Places
Visiting Placestsisves
 
110118 Presentasion Proposal Thesis Print
110118 Presentasion Proposal Thesis Print110118 Presentasion Proposal Thesis Print
110118 Presentasion Proposal Thesis PrintReggy Lu
 
Social Media Recruiting Israel 2011
Social Media Recruiting Israel 2011 Social Media Recruiting Israel 2011
Social Media Recruiting Israel 2011 iTalent
 
מציאות ברשת
מציאות ברשתמציאות ברשת
מציאות ברשתiTalent
 
Intranets2012: Aligning your intranet to your business
Intranets2012: Aligning your intranet to your businessIntranets2012: Aligning your intranet to your business
Intranets2012: Aligning your intranet to your businessDeloitte Australia
 
Intelligens ház
Intelligens házIntelligens ház
Intelligens házkleila83
 
dddddddddddddddd
dddddddddddddddddddddddddddddddd
ddddddddddddddddsbavaro
 
Citadel Career Center - Leading the way
Citadel Career Center - Leading the wayCitadel Career Center - Leading the way
Citadel Career Center - Leading the wayPage Tisdale
 
A New Entrepreneurship - A Backwards Approach
A New Entrepreneurship - A Backwards ApproachA New Entrepreneurship - A Backwards Approach
A New Entrepreneurship - A Backwards ApproachLoopshot
 

Viewers also liked (20)

Hula hoops
Hula hoopsHula hoops
Hula hoops
 
Presentacion house
Presentacion housePresentacion house
Presentacion house
 
Revolução Digital Pós NRF 2016
Revolução Digital Pós NRF 2016Revolução Digital Pós NRF 2016
Revolução Digital Pós NRF 2016
 
9.1º Notas
9.1º  Notas9.1º  Notas
9.1º Notas
 
Intranet homepage competition
Intranet homepage competitionIntranet homepage competition
Intranet homepage competition
 
Visiting Places
Visiting PlacesVisiting Places
Visiting Places
 
Marketology Social Media Masterclass presentation
Marketology Social Media Masterclass presentationMarketology Social Media Masterclass presentation
Marketology Social Media Masterclass presentation
 
110118 Presentasion Proposal Thesis Print
110118 Presentasion Proposal Thesis Print110118 Presentasion Proposal Thesis Print
110118 Presentasion Proposal Thesis Print
 
Social Media Recruiting Israel 2011
Social Media Recruiting Israel 2011 Social Media Recruiting Israel 2011
Social Media Recruiting Israel 2011
 
מציאות ברשת
מציאות ברשתמציאות ברשת
מציאות ברשת
 
Wo ist Pluto?
Wo ist Pluto?Wo ist Pluto?
Wo ist Pluto?
 
Mie presentation
Mie presentationMie presentation
Mie presentation
 
2136
21362136
2136
 
Intranets2012: Aligning your intranet to your business
Intranets2012: Aligning your intranet to your businessIntranets2012: Aligning your intranet to your business
Intranets2012: Aligning your intranet to your business
 
Francia 2013
Francia 2013Francia 2013
Francia 2013
 
Intelligens ház
Intelligens házIntelligens ház
Intelligens ház
 
dddddddddddddddd
dddddddddddddddddddddddddddddddd
dddddddddddddddd
 
Citadel Career Center - Leading the way
Citadel Career Center - Leading the wayCitadel Career Center - Leading the way
Citadel Career Center - Leading the way
 
Uranium!!!!
Uranium!!!!Uranium!!!!
Uranium!!!!
 
A New Entrepreneurship - A Backwards Approach
A New Entrepreneurship - A Backwards ApproachA New Entrepreneurship - A Backwards Approach
A New Entrepreneurship - A Backwards Approach
 

Similar to Class4 Security

Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskBeyondTrust
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systemsmsd11
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationShritam Bhowmick
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer SecurityKamal Acharya
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
RaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxRaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxaudeleypearl
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 

Similar to Class4 Security (20)

Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
 
information security management
information security managementinformation security management
information security management
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
 
introduction of ethical hacking. ppt
introduction of ethical hacking. pptintroduction of ethical hacking. ppt
introduction of ethical hacking. ppt
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
 
Module 4 Cyber Security Vulnerabilities& Safe Guards
Module 4 Cyber Security Vulnerabilities& Safe GuardsModule 4 Cyber Security Vulnerabilities& Safe Guards
Module 4 Cyber Security Vulnerabilities& Safe Guards
 
Module 4.pdf
Module 4.pdfModule 4.pdf
Module 4.pdf
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
RaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxRaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 

More from RMS

2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management2008 Rms Cross Cultural Management
2008 Rms Cross Cultural ManagementRMS
 
2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management2008 Rms Cross Cultural Management
2008 Rms Cross Cultural ManagementRMS
 
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans PhotosAmphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans PhotosRMS
 
Life Track
Life TrackLife Track
Life TrackRMS
 
Personality Pcm
Personality PcmPersonality Pcm
Personality PcmRMS
 
Ob
ObOb
ObRMS
 
Perception Pcm P1
Perception Pcm P1Perception Pcm P1
Perception Pcm P1RMS
 
Intro I Mba Pcm
Intro I Mba PcmIntro I Mba Pcm
Intro I Mba PcmRMS
 
The Jim Davis Case
The Jim Davis CaseThe Jim Davis Case
The Jim Davis CaseRMS
 
Perception Pcm P2
Perception Pcm  P2Perception Pcm  P2
Perception Pcm P2RMS
 
Foundations Of Leadership Pcm
Foundations Of  Leadership PcmFoundations Of  Leadership Pcm
Foundations Of Leadership PcmRMS
 
Class3 Edi Ppt
Class3 Edi PptClass3 Edi Ppt
Class3 Edi PptRMS
 
Class2 Business Software
Class2 Business SoftwareClass2 Business Software
Class2 Business SoftwareRMS
 
Class1 Intro Is
Class1 Intro IsClass1 Intro Is
Class1 Intro IsRMS
 
Pcm Mngt Acctg Budgetary Control
Pcm   Mngt Acctg   Budgetary ControlPcm   Mngt Acctg   Budgetary Control
Pcm Mngt Acctg Budgetary ControlRMS
 
Pcm Mngt Acctg Conclusion
Pcm   Mngt Acctg ConclusionPcm   Mngt Acctg Conclusion
Pcm Mngt Acctg ConclusionRMS
 
04 Marketing Concurrence
04 Marketing Concurrence04 Marketing Concurrence
04 Marketing ConcurrenceRMS
 
05 Marketing Diagnostic Interne ChaîNe Valeur
05 Marketing Diagnostic Interne ChaîNe Valeur05 Marketing Diagnostic Interne ChaîNe Valeur
05 Marketing Diagnostic Interne ChaîNe ValeurRMS
 
06 StratéGies GéNéRiques
06 StratéGies GéNéRiques06 StratéGies GéNéRiques
06 StratéGies GéNéRiquesRMS
 
03 Marketing Marché
03 Marketing Marché03 Marketing Marché
03 Marketing MarchéRMS
 

More from RMS (20)

2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management
 
2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management
 
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans PhotosAmphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
 
Life Track
Life TrackLife Track
Life Track
 
Personality Pcm
Personality PcmPersonality Pcm
Personality Pcm
 
Ob
ObOb
Ob
 
Perception Pcm P1
Perception Pcm P1Perception Pcm P1
Perception Pcm P1
 
Intro I Mba Pcm
Intro I Mba PcmIntro I Mba Pcm
Intro I Mba Pcm
 
The Jim Davis Case
The Jim Davis CaseThe Jim Davis Case
The Jim Davis Case
 
Perception Pcm P2
Perception Pcm  P2Perception Pcm  P2
Perception Pcm P2
 
Foundations Of Leadership Pcm
Foundations Of  Leadership PcmFoundations Of  Leadership Pcm
Foundations Of Leadership Pcm
 
Class3 Edi Ppt
Class3 Edi PptClass3 Edi Ppt
Class3 Edi Ppt
 
Class2 Business Software
Class2 Business SoftwareClass2 Business Software
Class2 Business Software
 
Class1 Intro Is
Class1 Intro IsClass1 Intro Is
Class1 Intro Is
 
Pcm Mngt Acctg Budgetary Control
Pcm   Mngt Acctg   Budgetary ControlPcm   Mngt Acctg   Budgetary Control
Pcm Mngt Acctg Budgetary Control
 
Pcm Mngt Acctg Conclusion
Pcm   Mngt Acctg ConclusionPcm   Mngt Acctg Conclusion
Pcm Mngt Acctg Conclusion
 
04 Marketing Concurrence
04 Marketing Concurrence04 Marketing Concurrence
04 Marketing Concurrence
 
05 Marketing Diagnostic Interne ChaîNe Valeur
05 Marketing Diagnostic Interne ChaîNe Valeur05 Marketing Diagnostic Interne ChaîNe Valeur
05 Marketing Diagnostic Interne ChaîNe Valeur
 
06 StratéGies GéNéRiques
06 StratéGies GéNéRiques06 StratéGies GéNéRiques
06 StratéGies GéNéRiques
 
03 Marketing Marché
03 Marketing Marché03 Marketing Marché
03 Marketing Marché
 

Recently uploaded

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 

Recently uploaded (20)

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 

Class4 Security

  • 1. INTRODUCTION TO INFORMATION SYSTEMS SUPdeCO - PCM - English Track October 2008 Computer-Based Information Systems Security PROF. DIANA MANGALAGIU MANAGEMENT AND STRATEGY DEPARTMENT
  • 2. Concept of security «  The security of an information system is its non-vulnerability to accidents or deliberate attacks, that is the impossibility that those attacks have any serious impacts on the state and the operation of the system » J. P. Magnier
  • 3.
  • 4. General definitions Un sinistre Causes of vulnerability Immediate and long-term effects An attack or a natural disaster Disaster : Source: P. Reix
  • 5. S ecurity guidelines : To handle security, it should be assessed using indicators including: 1 – Availability of information and functionalities 2 – Truthfulness of information 3 – Confidentiality of information 4 – Non-repudiation of communications 5 – Traceability of operations Potential causes of the disaster make it essential to keep watch over the vulnerability of the system and thus over the risks it runs. General definitions
  • 6.
  • 7. Security planning Policies for security 1 – Material resource security 2 – Software security 3 – Application security 4 – General security steps 5 – Insurance The idea that security is entirely handled by hardware and software related procedures is a dangerous utopia as it must come with organizational thinking as well as awareness and training of individuals.
  • 8. Four cornerstones of security & trust authentication integrity & non- authorisation confidentiality repudiation
  • 9.
  • 10.
  • 11.
  • 12. Confidentiality Only intended recipient can make sense of message or stored information authentication integrity & non- confidentiality repudiation
  • 13. Authorisation Is the user allowed to perform these operations? authentication integrity & non- authorisation confidentiality repudiation
  • 14.
  • 15.
  • 16.
  • 17.

Editor's Notes

  1. Bouygues Télécom : Sa panne informatique du 17/11/2004 lui coûte 16 millions d’Euros SNCF : 1000 terminaux paralysés en juillet 2004 Selon Microsoft , 2,4 milliards d’heures de travail dans les entreprises ce qui équivaut en France à 20€ de l’heure X 15 millions de personnes = 1,8 milliards d’euros de perte