SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
Information Security,[object Object],By,[object Object],Arjun - Presales Consultant,[object Object],arjun.hegde@yahoo.com,[object Object]
What is Information Security,[object Object],Information security means protecting data from unauthorized access, use, disclosure, disruption or modification,[object Object],Information Security Goals,[object Object],Confidentiality,[object Object],Integrity,[object Object],Availability,[object Object]
Why need Information Security,[object Object],Data breaches becoming common,[object Object],Shrinking time from exposure to attack,[object Object],Epidemic of security vulnerabilities,[object Object],Phishing and Spamming is a Big business,[object Object],Compliance needs – PCI, SOX, HIPPA,[object Object]
The Threat Landscape,[object Object]
Common Threats,[object Object],Virus – program that can copy itself and infect,[object Object],Worm – a self replicating virus,[object Object],Trojan Horse – program that contains or installs a malicious program,[object Object],Spyware – hidden programs that allow intruders to monitor and access your computer,[object Object],Spam – unsolicited  e-mail messages,[object Object],Blended Threats – combination of threats using multiple techniques to attack and propagate,[object Object]
Common Security Solutions,[object Object],Antivirus & Antispyware,[object Object],Firewall,[object Object],Intrusion Prevention,[object Object],Content Filtering,[object Object],Antispam,[object Object]
Enterprise Security Architecture,[object Object]
Web,[object Object],Mail  ,[object Object],Database ,[object Object],Internet,[object Object],Secure Enterprise,[object Object],Remote Filtering,[object Object],Gateway,[object Object],Desktop Antivirus,[object Object],Intrusion Prevention,[object Object],Content Filtering,[object Object],Desktop,[object Object],VPN,[object Object],Remote Desktop,[object Object],Gateway Antivirus,[object Object],Firewall,[object Object],Network Access Control,[object Object],Data Loss Prevention,[object Object],Patch Management,[object Object],VA & PT,[object Object],HIPS,[object Object],SIEM,[object Object],Antispam,[object Object],Server Antivirus,[object Object]
Security Needs for Enterprise,[object Object],Basic Security,[object Object],[object Object]
 Firewall

Mais conteúdo relacionado

Mais procurados

Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introductionShu Shin
 
Discovery Home S B Chapter 8
Discovery  Home  S B  Chapter  8Discovery  Home  S B  Chapter  8
Discovery Home S B Chapter 8tinwerf
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From MalwareRishu Mehra
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Isl awareness training
Isl awareness trainingIsl awareness training
Isl awareness trainingshibichery
 
Security and privacy in web
Security and privacy in webSecurity and privacy in web
Security and privacy in webMaher Alshammari
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Wapt course detail
Wapt course detailWapt course detail
Wapt course detailhackersguru
 
Sonic Wall Email Security End User
Sonic Wall Email Security End UserSonic Wall Email Security End User
Sonic Wall Email Security End UserRichard Daemen
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniqueswaqasahmad1995
 

Mais procurados (19)

Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
 
Discovery Home S B Chapter 8
Discovery  Home  S B  Chapter  8Discovery  Home  S B  Chapter  8
Discovery Home S B Chapter 8
 
Network Security
Network Security Network Security
Network Security
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From Malware
 
Network security
Network securityNetwork security
Network security
 
Virus encryption
Virus encryptionVirus encryption
Virus encryption
 
System security
System securitySystem security
System security
 
Isl awareness training
Isl awareness trainingIsl awareness training
Isl awareness training
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Security and privacy in web
Security and privacy in webSecurity and privacy in web
Security and privacy in web
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Network Security
Network SecurityNetwork Security
Network Security
 
Wapt course detail
Wapt course detailWapt course detail
Wapt course detail
 
System Security
System SecuritySystem Security
System Security
 
User wareness
User warenessUser wareness
User wareness
 
Information security policy
Information security policyInformation security policy
Information security policy
 
Sonic Wall Email Security End User
Sonic Wall Email Security End UserSonic Wall Email Security End User
Sonic Wall Email Security End User
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 

Destaque

Networking Basics - Sales Account Manager Training
Networking Basics - Sales Account Manager TrainingNetworking Basics - Sales Account Manager Training
Networking Basics - Sales Account Manager TrainingArjun V
 
Networking Basics
Networking BasicsNetworking Basics
Networking BasicsCarlo Fonda
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011Arjun V
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 

Destaque (11)

Network sec 1
Network sec 1Network sec 1
Network sec 1
 
Information Security
Information SecurityInformation Security
Information Security
 
Networking Basics - Sales Account Manager Training
Networking Basics - Sales Account Manager TrainingNetworking Basics - Sales Account Manager Training
Networking Basics - Sales Account Manager Training
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Semelhante a Information Security for Enterprise

Information Security
Information SecurityInformation Security
Information SecurityEvaJohnson26
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Securityxsy
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security STS
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating systemabdullah roomi
 
Cyber security
Cyber securityCyber security
Cyber securityAkdu095
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdfYashwanth Rm
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securityVansh Bathla
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedProf .Pragati Khade
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)AashishTanania
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfRavirajChavan10
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Information Security & Ethical Hacking
Information Security & Ethical HackingInformation Security & Ethical Hacking
Information Security & Ethical HackingIshan Agarwal
 

Semelhante a Information Security for Enterprise (20)

Information Security
Information SecurityInformation Security
Information Security
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
SAHITHI.PPT.pptx
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptx
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information Security & Ethical Hacking
Information Security & Ethical HackingInformation Security & Ethical Hacking
Information Security & Ethical Hacking
 

Information Security for Enterprise