SlideShare uma empresa Scribd logo
1 de 24
INFORMATION SECURITY
(infosec)
Presented by:
Isha Rana
AGENDA
 What is Information Security?
 Threats
 Why Information Security?
 What can we do?
What is Information Security?
Information security (infosec) is a set of
strategies for managing the
processes, tools and policies
necessary to prevent, detect,
document and counter threats to
digital and non-digital information.
Responsibilities
Infosec responsibilities include
establishing a set of business
processes that will protect information
assets regardless of how the
information is formatted or whether it
is in transit, is being processed or is at
rest in storage.
CIA triad
Infosec programs are built around the core
objectives of the CIA triad: maintaining the
 confidentiality
 integrity
 availability
of IT systems and business data.
These objectives ensure that sensitive
information is only disclosed to authorized
parties (confidentiality), prevent
unauthorized modification of data (integrity)
and guarantee the data can be accessed by
authorized parties when requested
(availability).
Threats
Malware:
◦ Hostile, intrusive, or annoying software or
program code ("malicious" + "software“)
◦ Includes computer viruses, worms, trojan horses,
bots, spyware, adware, etc
◦ Software is considered malware based on the
intent of the creator rather than any particular
features
Threats
Internet bot:
◦ also known as web robots, are automated
internet applications controlled by software
agents
◦ These bots interact with network services
intended for people, carrying out monotonous
tasks and behaving in a humanlike manner (i.e.,
computer game bot)
◦ Bots can gather information, reply to queries,
provide entertainment, and serve commercial
purposes.
◦ Botnet - a network of "zombie" computers used
to do automated tasks such as spamming or
reversing spamming
Definitions
Adware:
◦ Advertising-supported software is any
software package which automatically plays,
displays, or downloads advertising material to a
computer after the software is installed on it or
while the application is being used.
◦ Adware is software integrated into or bundled
with a program, typically as a way to recover
programming development costs through
advertising income
Threats
Spyware:
◦ A broad category of software designed to
intercept or take partial control of a computer's
operation without the informed consent of that
machine's owner or legitimate user
◦ In simpler terms, spyware is a type of program
that watches what users do with their computer
and then sends that information over the internet
Threats
Spyware:
◦ Spyware can collect many different types of
information about a user:
 Records the types of websites a user visits
 Records what is typed by the user to intercept
passwords or credit card numbers
 Used to launch “pop up” advertisements
◦ Many legitimate companies incorporate forms of
spyware into their software for purposes of
advertisement(Adware)
Spyware Example
Spyware Example
(add-on toolbars)
Threats
Spam:
◦ Spamming is the abuse of electronic messaging
systems to send unsolicited, undesired bulk
messages
◦ Spam media includes:
 e-mail spam (most widely recognized form)
 instant messaging spam
 Usenet newsgroup spam
 Web search engine spam
 spam in blogs
 mobile phone messaging spam
Spam Example
Threats
Phishing:
◦ A criminal activity using social engineering
techniques.
◦ An attempt to acquire sensitive data, such as
passwords and credit card details, by
masquerading as a trustworthy person or
business in an electronic communication.
◦ Typically carried out using email or an instant
message
Phishing Example
Points to “bad” IP
Address!
Identity Theft
Protecting your online privacy is the
best step you can take in preventing
the new but popular crime of Identity
Theft: stealing someone's "identity" in
order to fraudulently carry out
monetary transactions in the name of
the stolen identity.
Why Information Security
(infosec)?
 Governments, commercial businesses, and
individuals are all storing information
electronically
◦ compact, instantaneous transfer, easy access
 Ability to use information more efficiently has
resulted in a rapid increase in the value of
information
 Information stored electronically faces new
and potentially more damaging security
threats
◦ can potentially be stolen from a remote location
◦ much easier to intercept and alter electronic
communication than its paper-based
predecessors
What can we do?
Firewalls
 A "network firewall" is like a filter for
Internet messages: it lets some pass
through, but blocks others.
 A firewall selectively allows certain
messages to pass through based on
its type (e-mail, web, file sharing). All
other messages are stopped at the
gates.
Authenticating Sites and Using
Encryption
There are two main problems with the
out-of-the-box Internet:
i. identifying people or computers at
the other end of the network
ii. guarding against eavesdroppers.
Authentication solves the first problem,
and encryption solves the second.
Audit
A chronological record of system
activities that is sufficient to enable the
reconstruction and examination of a
given sequence of events
Risk analysis
The process of identifying: Security
risks
Symmetric and public key
cryptosystems
Symmetric-key cryptosystem
 same key is used for encryption
and decryption
 system with 1000 users requires
499,500 keys
◦ each pair of users requires a
different key
Example: DES
Public-key cryptosystem
 separate keys for encryption
and decryption
 system with 1000 users requires
2000 keys
◦ each individual user has
exactly two keys
Example: RSA
THANK YOU!

Mais conteúdo relacionado

Mais procurados

1 security goals
1   security goals1   security goals
1 security goals
drewz lin
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
angelaag98
 
Information security threats
Information security threatsInformation security threats
Information security threats
complianceonline123
 

Mais procurados (20)

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
1 security goals
1   security goals1   security goals
1 security goals
 
Cyber Crimes
Cyber Crimes Cyber Crimes
Cyber Crimes
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Malicion software
Malicion softwareMalicion software
Malicion software
 
Internet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security ConcernsInternet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security Concerns
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Information Security Basics for Businesses and Individuals
Information Security Basics for Businesses and IndividualsInformation Security Basics for Businesses and Individuals
Information Security Basics for Businesses and Individuals
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 

Semelhante a Information security

Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
Jennifer Letterman
 

Semelhante a Information security (20)

Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Data security
Data securityData security
Data security
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer security and
Computer security andComputer security and
Computer security and
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Information security
 Information security Information security
Information security
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security
Cyber securityCyber security
Cyber security
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
cyber security
cyber security cyber security
cyber security
 

Último

%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Último (20)

%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 

Information security

  • 2. AGENDA  What is Information Security?  Threats  Why Information Security?  What can we do?
  • 3. What is Information Security? Information security (infosec) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information.
  • 4. Responsibilities Infosec responsibilities include establishing a set of business processes that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage.
  • 5. CIA triad Infosec programs are built around the core objectives of the CIA triad: maintaining the  confidentiality  integrity  availability of IT systems and business data. These objectives ensure that sensitive information is only disclosed to authorized parties (confidentiality), prevent unauthorized modification of data (integrity) and guarantee the data can be accessed by authorized parties when requested (availability).
  • 6. Threats Malware: ◦ Hostile, intrusive, or annoying software or program code ("malicious" + "software“) ◦ Includes computer viruses, worms, trojan horses, bots, spyware, adware, etc ◦ Software is considered malware based on the intent of the creator rather than any particular features
  • 7. Threats Internet bot: ◦ also known as web robots, are automated internet applications controlled by software agents ◦ These bots interact with network services intended for people, carrying out monotonous tasks and behaving in a humanlike manner (i.e., computer game bot) ◦ Bots can gather information, reply to queries, provide entertainment, and serve commercial purposes. ◦ Botnet - a network of "zombie" computers used to do automated tasks such as spamming or reversing spamming
  • 8. Definitions Adware: ◦ Advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. ◦ Adware is software integrated into or bundled with a program, typically as a way to recover programming development costs through advertising income
  • 9. Threats Spyware: ◦ A broad category of software designed to intercept or take partial control of a computer's operation without the informed consent of that machine's owner or legitimate user ◦ In simpler terms, spyware is a type of program that watches what users do with their computer and then sends that information over the internet
  • 10. Threats Spyware: ◦ Spyware can collect many different types of information about a user:  Records the types of websites a user visits  Records what is typed by the user to intercept passwords or credit card numbers  Used to launch “pop up” advertisements ◦ Many legitimate companies incorporate forms of spyware into their software for purposes of advertisement(Adware)
  • 13. Threats Spam: ◦ Spamming is the abuse of electronic messaging systems to send unsolicited, undesired bulk messages ◦ Spam media includes:  e-mail spam (most widely recognized form)  instant messaging spam  Usenet newsgroup spam  Web search engine spam  spam in blogs  mobile phone messaging spam
  • 15. Threats Phishing: ◦ A criminal activity using social engineering techniques. ◦ An attempt to acquire sensitive data, such as passwords and credit card details, by masquerading as a trustworthy person or business in an electronic communication. ◦ Typically carried out using email or an instant message
  • 16. Phishing Example Points to “bad” IP Address!
  • 17. Identity Theft Protecting your online privacy is the best step you can take in preventing the new but popular crime of Identity Theft: stealing someone's "identity" in order to fraudulently carry out monetary transactions in the name of the stolen identity.
  • 18. Why Information Security (infosec)?  Governments, commercial businesses, and individuals are all storing information electronically ◦ compact, instantaneous transfer, easy access  Ability to use information more efficiently has resulted in a rapid increase in the value of information  Information stored electronically faces new and potentially more damaging security threats ◦ can potentially be stolen from a remote location ◦ much easier to intercept and alter electronic communication than its paper-based predecessors
  • 19. What can we do? Firewalls  A "network firewall" is like a filter for Internet messages: it lets some pass through, but blocks others.  A firewall selectively allows certain messages to pass through based on its type (e-mail, web, file sharing). All other messages are stopped at the gates.
  • 20. Authenticating Sites and Using Encryption There are two main problems with the out-of-the-box Internet: i. identifying people or computers at the other end of the network ii. guarding against eavesdroppers. Authentication solves the first problem, and encryption solves the second.
  • 21. Audit A chronological record of system activities that is sufficient to enable the reconstruction and examination of a given sequence of events
  • 22. Risk analysis The process of identifying: Security risks
  • 23. Symmetric and public key cryptosystems Symmetric-key cryptosystem  same key is used for encryption and decryption  system with 1000 users requires 499,500 keys ◦ each pair of users requires a different key Example: DES Public-key cryptosystem  separate keys for encryption and decryption  system with 1000 users requires 2000 keys ◦ each individual user has exactly two keys Example: RSA