SlideShare uma empresa Scribd logo
1 de 32
The presentation is being carried out to lay down a solution to a
problem arising related to computer security. Various security
strategies are being discussed in this presentation. These
strategies would help in successfully coping up with the
computer security issues. The security strategies
recommended to address the issue and the effectiveness of
mitigation strategy in controlling the issue are also discussed
in the presentation.
The computer security is the protection
of assets from unauthorized access,
alteration, use or destruction.
Therefore, for such protection an
effective strategies is must needed.
COMPUTERSECURITY ISSUES
There are some computer security issues which are normally faced
by the organization or by an individual as well. Following are
some of the issues:
Computer
security
issues
Internet
and
network
attacks
Informati
on theft
System
failure
Hardwar
e and
software
theft
Unauthor
ized
access
and use
SECURITY STRATEGIES
• To cope up with the computer security issues, the
organization or an individual can use the following
security strategies to prevent the security of their system
and data or information.
• These strategies will help the organization to improve
the level of security and safety of data.
PROACTIVE STRATEGY
 This strategy includes a set of predefined steps that can be
taken to prevent the computer systems from the attacks before
they occur.
 This includes identifying how an attack could possibly affect
or damage the system and the vulnerabilities it exploits.
 This pattern may help in determining the areas of
vulnerability that pose the greatest risk to the enterprise.
The proactive strategy has basically three steps:
Determining the damage that the attack will cause
Determining the vulnerabilities and weaknesses that the
attack will exploit (Klöti.et.al. 2013).
Minimizing the vulnerabilities and weaknesses that are
determined to be weak points in the system for that
specific type of attack.
KEY FINDINGS OF PROACTIVE STRATEGY
 Use of policies for data security
 Understanding about the sensitive data
 It goes beyond the technology implementation
 Take initiative for data security
 Use of data centric security
REACTIVE STRATEGY
 The reactive strategies defines the steps that must
be taken after or during an attack.
 It identifies the damage that was caused and the
vulnerabilities that were exploited in the attack.
 This strategy will determine the why it took place,
repair the damage that was caused by it and
implement a contingency plan (Easttom II, 2016).
BENEFITS OF REACTIVE STRATEGY
Following are the key benefits of strategy:
 Provides control over the use of computer system
 Improve the accountability
 Determine the level of threat
 Anticipate the future changes
 Help to assess the amount of damage and install
SECURITY BY DESIGNSTRATEGY
• A software is designed from the ground up to
be secure.
• It includes code reviews and unit testing are
used to make modules more secure.
• Audit trails tracking system activity for
determining the extent of the breach.
BENEFITSOF SECURITY BY DESIGN STRATEGY
Following are the major benefits of using the particular
strategy:
 Integration of methodologies
 Detecting and resolving problems
 Improve flexibility and adaptable architecture
 Integration of application for better security
 It is an effective means of ensuring the security, stability and
consistency of a computing environment.
 Proper planning and pre-deployment activities are required for a
successful deployment of application white listing technology.
 It can be deployed in support of policy which defines
applications which users are allowed to run or can run in the
course of their duties.
• Administrative privileges are designed to allow access of only
trusted personnel.
• Accounts with administrative privileges to a window domain
typically have the ability to effect changes or to see such
information from any system on that domain (Goldman.et.al, 2011).
• These privileges introduce a number of potential points of
weakness into that system.
PASSWORDS ANDAPPROPRIATE USER AUTHENTICATION
STRATEGY
 The best strategy for protecting the data from being accessed by an
unauthorized user.
 The user authorization can be verified in any security system via
piece of information like password, something possessed by an
individual like ID, credit and a biometric characteristic of the
individual like finger print (White, 2015).
 Through this the important and relevant information can be safe from
the authorized users.
 A proper planning is a best strategy to overcome from the
problems related to eventuality of hardware failure or loss
and data loss or corruption.
 Depending on the types of threats, disaster recover plans
may rely on one of a mix of strategies (Cichonski.et.al.
2012).
 The user using the computer system are require to
inform under this strategy to be careful of any
suspicious e-mails.
 According to this, the user are should be careful
when the email is from the known source, caution
should be exercised when opening attachments or
clicking on links in emails.
IMPLEMENTATION OF A VULNERABILITY MANAGEMENT
PROGRAM
 The most of the worms and viruses try to exploit bugs
and vulnerabilities within the operating system and
applications.
 The vulnerabilities can be introduced in network
everyday (Song, 2010). It is important to regularly review
the network and applications running on it for new
vulnerabilities.
 After this, a proper plan is then prepare for proper
management of vulnerabilities.
 The vulnerabilities can be managed by through patching,
upgrading, or managing the vulnerabilities using tools like
firewalls and Intrusion Detection Systems.
 The discovered vulnerabilities should also be rated and
prioritized regarding their criticality and their impact (Rid
& McBurney, 2012).
The critical data or information should be daily or periodically
must be regularly backup.
It is useful when a network gets infected with a computer virus
or system or hardware crash.
These backups must be stored safely in the offsite location .
Regular monitoring of network and system logs assist in
indentifying the computer virus or other criminal attacks.
Log files for the backups should be checked regularly in
order to insure that the backups succeeded.
Log files for anti-virus software deployed should be
regularly checked to ensure that PC are running the latest
version of antivirus.
These strategies ensure that the chances of attacks and their
impact is reduced and minimized to a greater extend.
DEVELOPMENT OF INCIDENT RESPONSE PLAN
The incident response plan outlines the roles and
responsibilities that people may have in the event of
a computer virus infecting the network or indeed
any other type of security breach (Hsiao.et.al. 2014).
The plan is prepared and drawn up by the agreed
relevant parties before an incident occurs.
CRYPTOGRAPHY STRATEGY
 This strategy is best when the confidentiality and security of
data and information is to be maintained.
 The modern cryptography exists at the intersection of the
disciplines computer science, mathematics and electrical
engineering.
 It is conversion of the information from a readable state to
apparent nonsense (Kahate, 2013)
 Only the authorized user can be decodes such encrypted data
or information.
RECOMMENDED SECURITY
STRATEGIES
To address the current issue the best strategy that would be
recommended is a proactive and reactive strategy.
These strategy is best because it provides a suitable way to
identify and reduced the affects of the security issues before
their cause.
It the impacts and core area of infection are not identified
before then the reactive strategy would help in repairing the
damage caused through an implemented contingency plan.
ACTIVITIES FOR IMPROVING
COMPUTER SECURITY
Using the following recommendation the security of
computer could be improved:
 Use of Linux
 Disable add-ons
 Deploy a hardware based firewall
 Enforce Strict password policies
 Use of content filter
EFFECTIVENESS OF MITIGATION
STRATEGY
The mitigation strategy would be effective in controlling the
issues with respect to other strategies in the following ways:
 Ensures that the identified issues before their cause are removed
to the best possible way.
 The damage occurred after their cause are repaired to the best
possible way as suggested in the contingency plan.
 The organization is always ready to fight against the computer
security issues with the proactive and reactive plans without
causing any disturbance in the operations of the organization.
THANK YOU

Mais conteúdo relacionado

Mais procurados

Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Security models
Security models Security models
Security models LJ PROJECTS
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Web application attacks
Web application attacksWeb application attacks
Web application attackshruth
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safetyDooremoore
 
Network security
Network securityNetwork security
Network securitytoamma
 
VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )Kashyap Mandaliya
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Controlidingolay
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service AttackDhrumil Panchal
 

Mais procurados (20)

Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Security models
Security models Security models
Security models
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer security
Computer securityComputer security
Computer security
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cia security model
Cia security modelCia security model
Cia security model
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Network security
Network securityNetwork security
Network security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Database security
Database securityDatabase security
Database security
 
Web Security
Web SecurityWeb Security
Web Security
 
VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Information security
Information securityInformation security
Information security
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Destaque

Security, ethics and performance management
Security, ethics and performance managementSecurity, ethics and performance management
Security, ethics and performance managementOZ Assignment help
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
Presentation printer
Presentation printerPresentation printer
Presentation printerDhruv Vyas
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Printers And Its Types
Printers And Its TypesPrinters And Its Types
Printers And Its TypesAasim Mushtaq
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 

Destaque (8)

Cmos
CmosCmos
Cmos
 
Security, ethics and performance management
Security, ethics and performance managementSecurity, ethics and performance management
Security, ethics and performance management
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Printer's
Printer'sPrinter's
Printer's
 
Presentation printer
Presentation printerPresentation printer
Presentation printer
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Printers And Its Types
Printers And Its TypesPrinters And Its Types
Printers And Its Types
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 

Semelhante a Computer security

Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionchristophefeltus
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxjaggernaoma
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxjenkinsmandie
 
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaJavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaChris Bailey
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docxeugeniadean34240
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for JavaTim Ellison
 
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENTESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENTijesajournal
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas IlyasSundas Kayani
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security NextLabs, Inc.
 

Semelhante a Computer security (20)

Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
02.security systems
02.security systems02.security systems
02.security systems
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docx
 
Bis Chapter15
Bis Chapter15Bis Chapter15
Bis Chapter15
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
I0516064
I0516064I0516064
I0516064
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
 
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaJavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for Java
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for Java
 
P3
P3P3
P3
 
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENTESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security
 

Mais de OZ Assignment help

Applications of Embedded System
Applications of Embedded SystemApplications of Embedded System
Applications of Embedded SystemOZ Assignment help
 
Business intelligence and data warehousing
Business intelligence and data warehousingBusiness intelligence and data warehousing
Business intelligence and data warehousingOZ Assignment help
 
Ece464 power electronics assignment solution
Ece464 power electronics assignment solutionEce464 power electronics assignment solution
Ece464 power electronics assignment solutionOZ Assignment help
 
Difference between personnel management and hrm assignment
Difference between personnel management and hrm assignmentDifference between personnel management and hrm assignment
Difference between personnel management and hrm assignmentOZ Assignment help
 
Service organisation of australia 3 bridges community incorporated
Service organisation of australia 3 bridges community incorporatedService organisation of australia 3 bridges community incorporated
Service organisation of australia 3 bridges community incorporatedOZ Assignment help
 
Unit 12 leadership style assignment solution
Unit 12 leadership style assignment solutionUnit 12 leadership style assignment solution
Unit 12 leadership style assignment solutionOZ Assignment help
 
Principles in health and social care assignment
Principles in health and social care assignmentPrinciples in health and social care assignment
Principles in health and social care assignmentOZ Assignment help
 
Electronic health records management
Electronic health records managementElectronic health records management
Electronic health records managementOZ Assignment help
 
Employee relations assignment help
Employee relations assignment helpEmployee relations assignment help
Employee relations assignment helpOZ Assignment help
 
Unit 12 physiological principles for hsc assignment solution
Unit 12 physiological principles for hsc assignment solutionUnit 12 physiological principles for hsc assignment solution
Unit 12 physiological principles for hsc assignment solutionOZ Assignment help
 
It project management assignment ppt
It project management assignment pptIt project management assignment ppt
It project management assignment pptOZ Assignment help
 

Mais de OZ Assignment help (13)

Applications of Embedded System
Applications of Embedded SystemApplications of Embedded System
Applications of Embedded System
 
Business intelligence and data warehousing
Business intelligence and data warehousingBusiness intelligence and data warehousing
Business intelligence and data warehousing
 
Ece464 power electronics assignment solution
Ece464 power electronics assignment solutionEce464 power electronics assignment solution
Ece464 power electronics assignment solution
 
Difference between personnel management and hrm assignment
Difference between personnel management and hrm assignmentDifference between personnel management and hrm assignment
Difference between personnel management and hrm assignment
 
Business project management
Business project managementBusiness project management
Business project management
 
Enterprises resource planning
Enterprises resource planningEnterprises resource planning
Enterprises resource planning
 
Service organisation of australia 3 bridges community incorporated
Service organisation of australia 3 bridges community incorporatedService organisation of australia 3 bridges community incorporated
Service organisation of australia 3 bridges community incorporated
 
Unit 12 leadership style assignment solution
Unit 12 leadership style assignment solutionUnit 12 leadership style assignment solution
Unit 12 leadership style assignment solution
 
Principles in health and social care assignment
Principles in health and social care assignmentPrinciples in health and social care assignment
Principles in health and social care assignment
 
Electronic health records management
Electronic health records managementElectronic health records management
Electronic health records management
 
Employee relations assignment help
Employee relations assignment helpEmployee relations assignment help
Employee relations assignment help
 
Unit 12 physiological principles for hsc assignment solution
Unit 12 physiological principles for hsc assignment solutionUnit 12 physiological principles for hsc assignment solution
Unit 12 physiological principles for hsc assignment solution
 
It project management assignment ppt
It project management assignment pptIt project management assignment ppt
It project management assignment ppt
 

Último

SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 

Último (20)

SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 

Computer security

  • 1.
  • 2. The presentation is being carried out to lay down a solution to a problem arising related to computer security. Various security strategies are being discussed in this presentation. These strategies would help in successfully coping up with the computer security issues. The security strategies recommended to address the issue and the effectiveness of mitigation strategy in controlling the issue are also discussed in the presentation.
  • 3. The computer security is the protection of assets from unauthorized access, alteration, use or destruction. Therefore, for such protection an effective strategies is must needed.
  • 4.
  • 5. COMPUTERSECURITY ISSUES There are some computer security issues which are normally faced by the organization or by an individual as well. Following are some of the issues: Computer security issues Internet and network attacks Informati on theft System failure Hardwar e and software theft Unauthor ized access and use
  • 6. SECURITY STRATEGIES • To cope up with the computer security issues, the organization or an individual can use the following security strategies to prevent the security of their system and data or information. • These strategies will help the organization to improve the level of security and safety of data.
  • 7. PROACTIVE STRATEGY  This strategy includes a set of predefined steps that can be taken to prevent the computer systems from the attacks before they occur.  This includes identifying how an attack could possibly affect or damage the system and the vulnerabilities it exploits.  This pattern may help in determining the areas of vulnerability that pose the greatest risk to the enterprise.
  • 8.
  • 9. The proactive strategy has basically three steps: Determining the damage that the attack will cause Determining the vulnerabilities and weaknesses that the attack will exploit (Klöti.et.al. 2013). Minimizing the vulnerabilities and weaknesses that are determined to be weak points in the system for that specific type of attack.
  • 10. KEY FINDINGS OF PROACTIVE STRATEGY  Use of policies for data security  Understanding about the sensitive data  It goes beyond the technology implementation  Take initiative for data security  Use of data centric security
  • 11. REACTIVE STRATEGY  The reactive strategies defines the steps that must be taken after or during an attack.  It identifies the damage that was caused and the vulnerabilities that were exploited in the attack.  This strategy will determine the why it took place, repair the damage that was caused by it and implement a contingency plan (Easttom II, 2016).
  • 12. BENEFITS OF REACTIVE STRATEGY Following are the key benefits of strategy:  Provides control over the use of computer system  Improve the accountability  Determine the level of threat  Anticipate the future changes  Help to assess the amount of damage and install
  • 13. SECURITY BY DESIGNSTRATEGY • A software is designed from the ground up to be secure. • It includes code reviews and unit testing are used to make modules more secure. • Audit trails tracking system activity for determining the extent of the breach.
  • 14. BENEFITSOF SECURITY BY DESIGN STRATEGY Following are the major benefits of using the particular strategy:  Integration of methodologies  Detecting and resolving problems  Improve flexibility and adaptable architecture  Integration of application for better security
  • 15.  It is an effective means of ensuring the security, stability and consistency of a computing environment.  Proper planning and pre-deployment activities are required for a successful deployment of application white listing technology.  It can be deployed in support of policy which defines applications which users are allowed to run or can run in the course of their duties.
  • 16. • Administrative privileges are designed to allow access of only trusted personnel. • Accounts with administrative privileges to a window domain typically have the ability to effect changes or to see such information from any system on that domain (Goldman.et.al, 2011). • These privileges introduce a number of potential points of weakness into that system.
  • 17. PASSWORDS ANDAPPROPRIATE USER AUTHENTICATION STRATEGY  The best strategy for protecting the data from being accessed by an unauthorized user.  The user authorization can be verified in any security system via piece of information like password, something possessed by an individual like ID, credit and a biometric characteristic of the individual like finger print (White, 2015).  Through this the important and relevant information can be safe from the authorized users.
  • 18.
  • 19.  A proper planning is a best strategy to overcome from the problems related to eventuality of hardware failure or loss and data loss or corruption.  Depending on the types of threats, disaster recover plans may rely on one of a mix of strategies (Cichonski.et.al. 2012).
  • 20.  The user using the computer system are require to inform under this strategy to be careful of any suspicious e-mails.  According to this, the user are should be careful when the email is from the known source, caution should be exercised when opening attachments or clicking on links in emails.
  • 21. IMPLEMENTATION OF A VULNERABILITY MANAGEMENT PROGRAM  The most of the worms and viruses try to exploit bugs and vulnerabilities within the operating system and applications.  The vulnerabilities can be introduced in network everyday (Song, 2010). It is important to regularly review the network and applications running on it for new vulnerabilities.
  • 22.  After this, a proper plan is then prepare for proper management of vulnerabilities.  The vulnerabilities can be managed by through patching, upgrading, or managing the vulnerabilities using tools like firewalls and Intrusion Detection Systems.  The discovered vulnerabilities should also be rated and prioritized regarding their criticality and their impact (Rid & McBurney, 2012).
  • 23. The critical data or information should be daily or periodically must be regularly backup. It is useful when a network gets infected with a computer virus or system or hardware crash. These backups must be stored safely in the offsite location . Regular monitoring of network and system logs assist in indentifying the computer virus or other criminal attacks.
  • 24. Log files for the backups should be checked regularly in order to insure that the backups succeeded. Log files for anti-virus software deployed should be regularly checked to ensure that PC are running the latest version of antivirus. These strategies ensure that the chances of attacks and their impact is reduced and minimized to a greater extend.
  • 25. DEVELOPMENT OF INCIDENT RESPONSE PLAN The incident response plan outlines the roles and responsibilities that people may have in the event of a computer virus infecting the network or indeed any other type of security breach (Hsiao.et.al. 2014). The plan is prepared and drawn up by the agreed relevant parties before an incident occurs.
  • 26. CRYPTOGRAPHY STRATEGY  This strategy is best when the confidentiality and security of data and information is to be maintained.  The modern cryptography exists at the intersection of the disciplines computer science, mathematics and electrical engineering.  It is conversion of the information from a readable state to apparent nonsense (Kahate, 2013)  Only the authorized user can be decodes such encrypted data or information.
  • 27.
  • 28. RECOMMENDED SECURITY STRATEGIES To address the current issue the best strategy that would be recommended is a proactive and reactive strategy. These strategy is best because it provides a suitable way to identify and reduced the affects of the security issues before their cause. It the impacts and core area of infection are not identified before then the reactive strategy would help in repairing the damage caused through an implemented contingency plan.
  • 29. ACTIVITIES FOR IMPROVING COMPUTER SECURITY Using the following recommendation the security of computer could be improved:  Use of Linux  Disable add-ons  Deploy a hardware based firewall  Enforce Strict password policies  Use of content filter
  • 30. EFFECTIVENESS OF MITIGATION STRATEGY The mitigation strategy would be effective in controlling the issues with respect to other strategies in the following ways:  Ensures that the identified issues before their cause are removed to the best possible way.  The damage occurred after their cause are repaired to the best possible way as suggested in the contingency plan.  The organization is always ready to fight against the computer security issues with the proactive and reactive plans without causing any disturbance in the operations of the organization.
  • 31.

Notas do Editor

  1. Computer security issues: Internet and network attacks: In the current scenario, internet is one of the key foundation of sharing the information and communication. However the organization and individual use the network security procedure that helps to maintain the effectiveness in services but attack of virus and malware is major security threat for the network that organizations are using. Information theft: The use of pen drives, data card and mobile phones are increasing the threat for the information theft as staff members or external person can store information through these devises which can create security issues for organization. System failure: For security of information and data the leading organizations has implemented the system that protect from the unauthorized access but the situation like failure of system is influencing the process of managing the security level. Hardware and software theft: The issue of security in computer is theft of hardware and software that can be done by the individual and group who has the access of using the system.
  2. This is an important strategy that transform the data into an unusable form, reducing the risk in the case of unauthorized access. For improvement in the security and protection of sensitive data this kind of strategy is more beneficial and useful that helps to coded the information and block the illegal activities.
  3. Process of encryption: Encoding: For security purpose and protecting the data it is being used for change the presentation of data and information that developed through coded form. Channel: The data that need to be share through internet sources will go through channel. The encoding of data helps to protect the information from theft . Decoding: At the receiver end the data and information could be read or review by using the decoding.