SlideShare a Scribd company logo
1 of 17
Information TechnologyInformation Technology
Security AssessmentSecurity Assessment
YULISA ROSLIANA
Hys.yulisarosliana@gmail.com
YULISA ROSLIANA
Hys.yulisarosliana@gmail.com
http://sif.uin-suska.ac.id/ http://fst.uin-suska.ac.id/ http://www.uin-suska.ac.id/
The Global ThreatThe Global Threat
 Information security is not just a paperwork
drill…there are dangerous adversaries out
there capable of launching serious attacks
on our information systems that can result
in severe or catastrophic damage to the
nation’s critical information infrastructure
and ultimately threaten our economic and
national security…
 Information security is not just a paperwork
drill…there are dangerous adversaries out
there capable of launching serious attacks
on our information systems that can result
in severe or catastrophic damage to the
nation’s critical information infrastructure
and ultimately threaten our economic and
national security…
http://sif.uin-suska.ac.id/ http://fst.uin-suska.ac.id/ http://www.uin-suska.ac.id/
Critical InfrastructuresCritical Infrastructures
ExamplesExamples
 Energy (electrical, nuclear, gas and oil, dams)
 Transportation (air, road, rail, port, waterways)
 Public Health Systems / Emergency Services
 Information and Telecommunications
 Defense Industry
 Banking and Finance
 Postal and Shipping
 Agriculture / Food / Water
 Chemical
 Energy (electrical, nuclear, gas and oil, dams)
 Transportation (air, road, rail, port, waterways)
 Public Health Systems / Emergency Services
 Information and Telecommunications
 Defense Industry
 Banking and Finance
 Postal and Shipping
 Agriculture / Food / Water
 Chemical
Computer Security Practices inComputer Security Practices in
Nonprofit OrganizationsNonprofit Organizations
• When asked how employees would
characterize the state of their own
organization's computer security practices,
nearly a third of the respondents (32%)
acknowledged that their computer security
practices needed to be improved.
• How respondents described their own
organization's computer security?
•
• When asked how employees would
characterize the state of their own
organization's computer security practices,
nearly a third of the respondents (32%)
acknowledged that their computer security
practices needed to be improved.
• How respondents described their own
organization's computer security?
•
Threats to SecurityThreats to Security
Connectivity
Complexity
Which of the following statements bestWhich of the following statements best
describes your organization's computerdescribes your organization's computer
security?security?
Does your organization have a dataDoes your organization have a data
recovery plan to implement in the event ofrecovery plan to implement in the event of
catastrophic data loss?catastrophic data loss?
In your opinion, what are the computerIn your opinion, what are the computer
security issues that your organizationsecurity issues that your organization
needs to address?needs to address?
The Risks are RealThe Risks are Real
• • Lost laptops and portable storage devices
• • Data/Information “left” on public computers
• • Data/Information intercepted in transmission
• • Spyware, “malware,” “keystroke logging”
• • Unprotected computers infected within seconds
• of being connected to the network
• • Thousands of attacks on campus networks
• every day
• • Lost laptops and portable storage devices
• • Data/Information “left” on public computers
• • Data/Information intercepted in transmission
• • Spyware, “malware,” “keystroke logging”
• • Unprotected computers infected within seconds
• of being connected to the network
• • Thousands of attacks on campus networks
• every day
Risk
Identification
Report
&
Briefing
Data
Analysis
Vulnerability
Scan
Document
Review
Requirement Study
And
Situation Analysis
Risk Management FlowRisk Management Flow
• Investigate
• Analyze: Risk Identification Identify the
vulnerability and
• Analyze : Risk Control investigate how to
control vulnerabilities
• Design
• Implement
• Maintain
• Investigate
• Analyze: Risk Identification Identify the
vulnerability and
• Analyze : Risk Control investigate how to
control vulnerabilities
• Design
• Implement
• Maintain
Information Security ProgramInformation Security Program
Adversaries attack the weakest link…where is yours?
 Risk assessment
 Security planning
 Security policies and procedures
 Contingency planning
 Incident response planning
 Security awareness and training
 Physical security
 Personnel security
 Certification, accreditation, and
security assessments
 Access control mechanisms
 Identification & authentication mechanisms
(Biometrics, tokens, passwords)
 Audit mechanisms
 Encryption mechanisms
 Firewalls and network security mechanisms
 Intrusion detection systems
 Security configuration settings
 Anti-viral software
 Smart cards
Links in the Security Chain: Management, Operational, and Technical Controls
What you need to knowWhat you need to know
• IT resources to be managed
• What’s available on your network
• Policies, laws & regulations
• Security Awareness
• Risk Assessment, Mitigation, & Monitoring
• Resources to help you
• IT resources to be managed
• What’s available on your network
• Policies, laws & regulations
• Security Awareness
• Risk Assessment, Mitigation, & Monitoring
• Resources to help you
The Golden RulesThe Golden Rules
Building an Effective Enterprise Information Security ProgramBuilding an Effective Enterprise Information Security Program
 Develop an enterprise-wide information security strategy
and game plan
 Get corporate “buy in” for the enterprise information
security program—effective programs start at the top
 Build information security into the infrastructure of the
enterprise
 Establish level of “due diligence” for information security
 Focus initially on mission/business case impacts—bring in
threat information only when specific and credible
 Develop an enterprise-wide information security strategy
and game plan
 Get corporate “buy in” for the enterprise information
security program—effective programs start at the top
 Build information security into the infrastructure of the
enterprise
 Establish level of “due diligence” for information security
 Focus initially on mission/business case impacts—bring in
threat information only when specific and credible
The Golden RulesThe Golden Rules
Building an Effective Enterprise Information Security ProgramBuilding an Effective Enterprise Information Security Program
 Create a balanced information security program with
management, operational, and technical security controls
 Employ a solid foundation of security controls first, then
build on that foundation guided by an assessment of risk
 Avoid complicated and expensive risk assessments that rely
on flawed assumptions or unverifiable data
 Harden the target; place multiple barriers between the
adversary and enterprise information systems
 Be a good consumer—beware of vendors trying to sell
“single point solutions” for enterprise security problems
 Create a balanced information security program with
management, operational, and technical security controls
 Employ a solid foundation of security controls first, then
build on that foundation guided by an assessment of risk
 Avoid complicated and expensive risk assessments that rely
on flawed assumptions or unverifiable data
 Harden the target; place multiple barriers between the
adversary and enterprise information systems
 Be a good consumer—beware of vendors trying to sell
“single point solutions” for enterprise security problems
The Golden RulesThe Golden Rules
Building an Effective Enterprise Information Security ProgramBuilding an Effective Enterprise Information Security Program
 Don’t be overwhelmed with the enormity or complexity of
the information security problem—take one step at a time
and build on small successes
 Don’t tolerate indifference to enterprise information security
problems
And finally…
 Manage enterprise risk—don’t try to avoid it!
 Don’t be overwhelmed with the enormity or complexity of
the information security problem—take one step at a time
and build on small successes
 Don’t tolerate indifference to enterprise information security
problems
And finally…
 Manage enterprise risk—don’t try to avoid it!
ThanksThanks
QQ
AA

More Related Content

What's hot

Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information securityethanBrownusa
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachFletcher Media
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy Dguest34b014
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesJack Nichelson
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policycharlesgarrett
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Bloxx
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityMatthew Rosenquist
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a SciencePankaj Rane
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksTripwire
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)Kroll
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 

What's hot (20)

Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data Breach
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 

Similar to Security analysis

Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseShwetank Jayaswal
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI JoAnna Cheshire
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023CBIZ, Inc.
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9Amanda Case
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2marchharvey
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolioPatrick Bouillaud
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
Core_Network_Insight
Core_Network_InsightCore_Network_Insight
Core_Network_InsightTim Bell
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideInspiring Women
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
 

Similar to Security analysis (20)

Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, Expertise
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Cyber security
Cyber securityCyber security
Cyber security
 
Core_Network_Insight
Core_Network_InsightCore_Network_Insight
Core_Network_Insight
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 

Recently uploaded

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 

Recently uploaded (20)

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 

Security analysis

  • 1. Information TechnologyInformation Technology Security AssessmentSecurity Assessment YULISA ROSLIANA Hys.yulisarosliana@gmail.com YULISA ROSLIANA Hys.yulisarosliana@gmail.com http://sif.uin-suska.ac.id/ http://fst.uin-suska.ac.id/ http://www.uin-suska.ac.id/
  • 2. The Global ThreatThe Global Threat  Information security is not just a paperwork drill…there are dangerous adversaries out there capable of launching serious attacks on our information systems that can result in severe or catastrophic damage to the nation’s critical information infrastructure and ultimately threaten our economic and national security…  Information security is not just a paperwork drill…there are dangerous adversaries out there capable of launching serious attacks on our information systems that can result in severe or catastrophic damage to the nation’s critical information infrastructure and ultimately threaten our economic and national security… http://sif.uin-suska.ac.id/ http://fst.uin-suska.ac.id/ http://www.uin-suska.ac.id/
  • 3. Critical InfrastructuresCritical Infrastructures ExamplesExamples  Energy (electrical, nuclear, gas and oil, dams)  Transportation (air, road, rail, port, waterways)  Public Health Systems / Emergency Services  Information and Telecommunications  Defense Industry  Banking and Finance  Postal and Shipping  Agriculture / Food / Water  Chemical  Energy (electrical, nuclear, gas and oil, dams)  Transportation (air, road, rail, port, waterways)  Public Health Systems / Emergency Services  Information and Telecommunications  Defense Industry  Banking and Finance  Postal and Shipping  Agriculture / Food / Water  Chemical
  • 4. Computer Security Practices inComputer Security Practices in Nonprofit OrganizationsNonprofit Organizations • When asked how employees would characterize the state of their own organization's computer security practices, nearly a third of the respondents (32%) acknowledged that their computer security practices needed to be improved. • How respondents described their own organization's computer security? • • When asked how employees would characterize the state of their own organization's computer security practices, nearly a third of the respondents (32%) acknowledged that their computer security practices needed to be improved. • How respondents described their own organization's computer security? •
  • 5. Threats to SecurityThreats to Security Connectivity Complexity
  • 6. Which of the following statements bestWhich of the following statements best describes your organization's computerdescribes your organization's computer security?security?
  • 7. Does your organization have a dataDoes your organization have a data recovery plan to implement in the event ofrecovery plan to implement in the event of catastrophic data loss?catastrophic data loss?
  • 8. In your opinion, what are the computerIn your opinion, what are the computer security issues that your organizationsecurity issues that your organization needs to address?needs to address?
  • 9. The Risks are RealThe Risks are Real • • Lost laptops and portable storage devices • • Data/Information “left” on public computers • • Data/Information intercepted in transmission • • Spyware, “malware,” “keystroke logging” • • Unprotected computers infected within seconds • of being connected to the network • • Thousands of attacks on campus networks • every day • • Lost laptops and portable storage devices • • Data/Information “left” on public computers • • Data/Information intercepted in transmission • • Spyware, “malware,” “keystroke logging” • • Unprotected computers infected within seconds • of being connected to the network • • Thousands of attacks on campus networks • every day
  • 11. Risk Management FlowRisk Management Flow • Investigate • Analyze: Risk Identification Identify the vulnerability and • Analyze : Risk Control investigate how to control vulnerabilities • Design • Implement • Maintain • Investigate • Analyze: Risk Identification Identify the vulnerability and • Analyze : Risk Control investigate how to control vulnerabilities • Design • Implement • Maintain
  • 12. Information Security ProgramInformation Security Program Adversaries attack the weakest link…where is yours?  Risk assessment  Security planning  Security policies and procedures  Contingency planning  Incident response planning  Security awareness and training  Physical security  Personnel security  Certification, accreditation, and security assessments  Access control mechanisms  Identification & authentication mechanisms (Biometrics, tokens, passwords)  Audit mechanisms  Encryption mechanisms  Firewalls and network security mechanisms  Intrusion detection systems  Security configuration settings  Anti-viral software  Smart cards Links in the Security Chain: Management, Operational, and Technical Controls
  • 13. What you need to knowWhat you need to know • IT resources to be managed • What’s available on your network • Policies, laws & regulations • Security Awareness • Risk Assessment, Mitigation, & Monitoring • Resources to help you • IT resources to be managed • What’s available on your network • Policies, laws & regulations • Security Awareness • Risk Assessment, Mitigation, & Monitoring • Resources to help you
  • 14. The Golden RulesThe Golden Rules Building an Effective Enterprise Information Security ProgramBuilding an Effective Enterprise Information Security Program  Develop an enterprise-wide information security strategy and game plan  Get corporate “buy in” for the enterprise information security program—effective programs start at the top  Build information security into the infrastructure of the enterprise  Establish level of “due diligence” for information security  Focus initially on mission/business case impacts—bring in threat information only when specific and credible  Develop an enterprise-wide information security strategy and game plan  Get corporate “buy in” for the enterprise information security program—effective programs start at the top  Build information security into the infrastructure of the enterprise  Establish level of “due diligence” for information security  Focus initially on mission/business case impacts—bring in threat information only when specific and credible
  • 15. The Golden RulesThe Golden Rules Building an Effective Enterprise Information Security ProgramBuilding an Effective Enterprise Information Security Program  Create a balanced information security program with management, operational, and technical security controls  Employ a solid foundation of security controls first, then build on that foundation guided by an assessment of risk  Avoid complicated and expensive risk assessments that rely on flawed assumptions or unverifiable data  Harden the target; place multiple barriers between the adversary and enterprise information systems  Be a good consumer—beware of vendors trying to sell “single point solutions” for enterprise security problems  Create a balanced information security program with management, operational, and technical security controls  Employ a solid foundation of security controls first, then build on that foundation guided by an assessment of risk  Avoid complicated and expensive risk assessments that rely on flawed assumptions or unverifiable data  Harden the target; place multiple barriers between the adversary and enterprise information systems  Be a good consumer—beware of vendors trying to sell “single point solutions” for enterprise security problems
  • 16. The Golden RulesThe Golden Rules Building an Effective Enterprise Information Security ProgramBuilding an Effective Enterprise Information Security Program  Don’t be overwhelmed with the enormity or complexity of the information security problem—take one step at a time and build on small successes  Don’t tolerate indifference to enterprise information security problems And finally…  Manage enterprise risk—don’t try to avoid it!  Don’t be overwhelmed with the enormity or complexity of the information security problem—take one step at a time and build on small successes  Don’t tolerate indifference to enterprise information security problems And finally…  Manage enterprise risk—don’t try to avoid it!

Editor's Notes

  1. Title is: Threats to security. Photograph of a radio tower to demonstrate connectivity, and a second photograph of a magnified computer chip to demonstrate complexity.
  2. This slide shows a picture of a chain to demonstrate the concept that a chain is only as strong as its weakest link. All listed Management, Operational and Technical controls must be in place.