SlideShare uma empresa Scribd logo
1 de 65
Baixar para ler offline
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Information Security
Sukant Kole
Advanced Centre for Informatics & Innovative Learning
Indira Gandhi National Open University, New Delhi
August 24, 2010
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
What is Information Security ?
Definition
Information Security means protection of information and
information system from unauthorized access, modification and
misuse of information or destruction.
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
What is Information Security ?
Definition
Information Security means protection of information and
information system from unauthorized access, modification and
misuse of information or destruction.
Impact of Weather Forecasting & Flight Scheduling System
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Integrity
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Integrity
Confidentiality
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Integrity
Confidentiality
Availability
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Integrity
Confidentiality
Availability
Security
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Integrity
Confidentiality
Availability
Security
Privacy
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Cyber Espionage
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Access restriction to datacentre, Security surveillance,
Disaster Recovery
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Access restriction to datacentre, Security surveillance,
Disaster Recovery
VLAN, Authentication Authorization & Auditing service,
WPA-PSK
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Access restriction to datacentre, Security surveillance,
Disaster Recovery
VLAN, Authentication Authorization & Auditing service,
WPA-PSK
Security patches, Stable version, 3 tier architecture
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
What is encryption ?
Definition
“....In cryptography, encryption is the process of transforming
information (referred to as plaintext) using an algorithm (called
cipher) to make it unreadable to anyone except those possessing
special knowledge, usually referred to as a key. The result of the
process is encrypted information (in cryptography, referred to as
ciphertext....” (Source: Wikipedia)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Symmetric Encryption
(Ref: http://www.devx.com/dbzone/Article/29232/1954)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
Asymmetric Encryption
(Ref: www.uic.edu/depts/accc/newsletter/adn26/figure2.html)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies (Password, Resource Access)
IT Policies
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies (Password, Resource Access)
IT Policies
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies (Password, Resource Access)
IT Policies (Backup, firewall, IDS & IPS)
General
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies (Password, Resource Access)
IT Policies (Backup, firewall, IDS & IPS)
General
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Attributes of Information Security
Type of threats
Types of security measures
Encryption
Security Policies
User Policies (Password, Resource Access)
IT Policies (Backup, firewall, IDS & IPS)
General (Service License Agreement, Business Continuity)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Worm
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Worm
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Social Engineering attacks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Definition
“....In the field of networking, the specialist area of network
security consists of the provisions and policies adopted by the
network administrator to prevent and monitor unauthorized access,
misuse, modification, or denial of the computer network and
network-accessible resources....” (Source: Wikipedia)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,
Packet flooding)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,
Packet flooding)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,
Packet flooding)
Unauthorized access to resources (unsecured LAN /WLAN
network points)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,
Packet flooding)
Unauthorized access to resources (unsecured LAN /WLAN
network points)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,
Packet flooding)
Unauthorized access to resources (unsecured LAN /WLAN
network points)
MAC Spoofing, Man-in-the-middle attack
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Vulnerability Assessment tools (Nessus, Wireshark)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Vulnerability Assessment tools (Nessus, Wireshark)
Penetration Testing assessment
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
De-Militarized Zones
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
De-Militarized Zones
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
De-Militarized Zones
Virtual LANs
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
De-Militarized Zones
Virtual LANs
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
What is network security
Threats to network security
Tools of network security
Secure network devices
De-Militarized Zones
Virtual LANs
Authentication, Authorization, Auditing Service (Desktop,
Web)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
Information Security Concerns
Software Vulnerabilties
Network Security and Authentication
Open Discussion
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Mais conteúdo relacionado

Mais procurados

08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...
IAESIJEECS
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
backdoor
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
ashu6
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Security B-Sides
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
 
Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015
Timothy Nolan
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
Irsandi Hasan
 

Mais procurados (20)

Use GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouUse GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With You
 
Security threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerceSecurity threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerce
 
08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
 
Securing VoIP Networks
Securing VoIP NetworksSecuring VoIP Networks
Securing VoIP Networks
 
CV_A-Barakat
CV_A-BarakatCV_A-Barakat
CV_A-Barakat
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
Hacking3e ppt ch11
Hacking3e ppt ch11Hacking3e ppt ch11
Hacking3e ppt ch11
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)
 

Semelhante a Information Security: DBPO

Maloney slides
Maloney slidesMaloney slides
Maloney slides
Onkar Sule
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership
Leonardo
 

Semelhante a Information Security: DBPO (20)

CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
ISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptxISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptx
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 
Security in it
Security in it Security in it
Security in it
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 

Último

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Information Security: DBPO

  • 1. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Information Security Sukant Kole Advanced Centre for Informatics & Innovative Learning Indira Gandhi National Open University, New Delhi August 24, 2010 Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 2. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies What is Information Security ? Definition Information Security means protection of information and information system from unauthorized access, modification and misuse of information or destruction. Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 3. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies What is Information Security ? Definition Information Security means protection of information and information system from unauthorized access, modification and misuse of information or destruction. Impact of Weather Forecasting & Flight Scheduling System Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 4. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Integrity Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 5. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Integrity Confidentiality Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 6. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Integrity Confidentiality Availability Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 7. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Integrity Confidentiality Availability Security Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 8. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Integrity Confidentiality Availability Security Privacy Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 9. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 10. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 11. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 12. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 13. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 14. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 15. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 16. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 17. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 18. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Cloud computing security Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 19. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Cloud computing security Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 20. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Physical (Malicious insiders, Careless Employees) Network Application (Exploited Vulnerabilities, Zero day attacks) Access Devices Mobile devices, USB Devices Social Networking Cloud computing security Cyber Espionage Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 21. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Access restriction to datacentre, Security surveillance, Disaster Recovery Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 22. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Access restriction to datacentre, Security surveillance, Disaster Recovery VLAN, Authentication Authorization & Auditing service, WPA-PSK Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 23. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Access restriction to datacentre, Security surveillance, Disaster Recovery VLAN, Authentication Authorization & Auditing service, WPA-PSK Security patches, Stable version, 3 tier architecture Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 24. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies What is encryption ? Definition “....In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext....” (Source: Wikipedia) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 25. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Symmetric Encryption (Ref: http://www.devx.com/dbzone/Article/29232/1954) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 26. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies Asymmetric Encryption (Ref: www.uic.edu/depts/accc/newsletter/adn26/figure2.html) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 27. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 28. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 29. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies (Password, Resource Access) IT Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 30. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies (Password, Resource Access) IT Policies Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 31. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies (Password, Resource Access) IT Policies (Backup, firewall, IDS & IPS) General Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 32. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies (Password, Resource Access) IT Policies (Backup, firewall, IDS & IPS) General Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 33. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Attributes of Information Security Type of threats Types of security measures Encryption Security Policies User Policies (Password, Resource Access) IT Policies (Backup, firewall, IDS & IPS) General (Service License Agreement, Business Continuity) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 34. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 35. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 36. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 37. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 38. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 39. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 40. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 41. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 42. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm (Morris Worm, November 2, 1988) Trojan Horses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 43. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm (Morris Worm, November 2, 1988) Trojan Horses Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 44. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Introduction Infection process Viruses Worm (Morris Worm, November 2, 1988) Trojan Horses Social Engineering attacks Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 45. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Definition “....In the field of networking, the specialist area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources....” (Source: Wikipedia) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 46. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 47. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 48. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Unauthorized access to resources (unsecured LAN /WLAN network points) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 49. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Unauthorized access to resources (unsecured LAN /WLAN network points) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 50. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Denial of Service (ARP Posioning, DNS Cache Poisoning, Packet flooding) Unauthorized access to resources (unsecured LAN /WLAN network points) MAC Spoofing, Man-in-the-middle attack Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 51. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 52. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 53. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 54. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 55. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 56. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 57. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Directory Services (LDAP, MS-ADS) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 58. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Directory Services (LDAP, MS-ADS) Vulnerability Assessment tools (Nessus, Wireshark) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 59. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices Firewall [Software, Hardware] Virtual LANs, Virtual Private Networks Secured and encrypted access to resources De-Militarized Zones Intrusion Detection & Prevention System Honeypots Directory Services (LDAP, MS-ADS) Vulnerability Assessment tools (Nessus, Wireshark) Penetration Testing assessment Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 60. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices De-Militarized Zones Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 61. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices De-Militarized Zones Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 62. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices De-Militarized Zones Virtual LANs Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 63. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices De-Militarized Zones Virtual LANs Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 64. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion What is network security Threats to network security Tools of network security Secure network devices De-Militarized Zones Virtual LANs Authentication, Authorization, Auditing Service (Desktop, Web) Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
  • 65. Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting