SlideShare uma empresa Scribd logo
1 de 17
INTRODUCTION TO INFORMATION  SYSTEMS SUPdeCO - PCM - English Track October 2008 Computer-Based Information Systems  Security PROF. DIANA MANGALAGIU MANAGEMENT AND STRATEGY DEPARTMENT
Concept of security «  The security of an information system is its non-vulnerability to accidents or deliberate attacks, that is the impossibility that those attacks have any serious impacts on the state and the operation of the system »  J. P. Magnier
Why security is a hot topic ,[object Object],[object Object],[object Object],[object Object]
General   definitions Un sinistre Causes of vulnerability Immediate and long-term effects An attack or a natural disaster Disaster : Source: P. Reix
S ecurity guidelines : To handle security, it should be assessed using indicators including: 1 – Availability  of information and functionalities 2 – Truthfulness  of information 3 –  Confidentiality  of information 4 –  Non-repudiation  of communications 5 –  Traceability  of operations Potential causes of the disaster   make it essential to keep watch over the vulnerability of the system and thus over the  risks  it runs. General   definitions
Causes of disasters ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security  planning Policies for security 1 – Material resource security 2 – Software security 3 – Application security 4 – General security steps 5 – Insurance The idea that security is entirely handled by hardware and software related procedures is a dangerous utopia as it must come with organizational thinking as well as awareness and training of individuals.
Four cornerstones of security & trust authentication integrity & non- authorisation confidentiality repudiation
Authentication ,[object Object],authentication
Integrity ,[object Object],authentication integrity
Non-repudiation ,[object Object],authentication integrity & non- repudiation
Confidentiality Only intended recipient can make sense of message or stored information authentication integrity & non- confidentiality repudiation
Authorisation Is the user allowed to perform these operations? authentication integrity & non- authorisation confidentiality repudiation
Security tradeoffs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Common web scenarios and their security aspects  Scenario 1: online banking ,[object Object],[object Object],[object Object],[object Object]
Scenario 2: Downloading code ,[object Object],[object Object],[object Object]
Scenario 3: online credit card transactions ,[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
Ana Meskovska
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
T. J. Saotome
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
Afna Crcs
 

Mais procurados (20)

E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information security
Information securityInformation security
Information security
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
 
презентация1
презентация1презентация1
презентация1
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 

Destaque

Visiting Places
Visiting PlacesVisiting Places
Visiting Places
tsisves
 
Intelligens ház
Intelligens házIntelligens ház
Intelligens ház
kleila83
 
dddddddddddddddd
dddddddddddddddddddddddddddddddd
dddddddddddddddd
sbavaro
 

Destaque (20)

Hula hoops
Hula hoopsHula hoops
Hula hoops
 
Presentacion house
Presentacion housePresentacion house
Presentacion house
 
Revolução Digital Pós NRF 2016
Revolução Digital Pós NRF 2016Revolução Digital Pós NRF 2016
Revolução Digital Pós NRF 2016
 
9.1º Notas
9.1º  Notas9.1º  Notas
9.1º Notas
 
Intranet homepage competition
Intranet homepage competitionIntranet homepage competition
Intranet homepage competition
 
Visiting Places
Visiting PlacesVisiting Places
Visiting Places
 
Marketology Social Media Masterclass presentation
Marketology Social Media Masterclass presentationMarketology Social Media Masterclass presentation
Marketology Social Media Masterclass presentation
 
110118 Presentasion Proposal Thesis Print
110118 Presentasion Proposal Thesis Print110118 Presentasion Proposal Thesis Print
110118 Presentasion Proposal Thesis Print
 
Social Media Recruiting Israel 2011
Social Media Recruiting Israel 2011 Social Media Recruiting Israel 2011
Social Media Recruiting Israel 2011
 
מציאות ברשת
מציאות ברשתמציאות ברשת
מציאות ברשת
 
Wo ist Pluto?
Wo ist Pluto?Wo ist Pluto?
Wo ist Pluto?
 
Mie presentation
Mie presentationMie presentation
Mie presentation
 
2136
21362136
2136
 
Intranets2012: Aligning your intranet to your business
Intranets2012: Aligning your intranet to your businessIntranets2012: Aligning your intranet to your business
Intranets2012: Aligning your intranet to your business
 
Francia 2013
Francia 2013Francia 2013
Francia 2013
 
Intelligens ház
Intelligens házIntelligens ház
Intelligens ház
 
dddddddddddddddd
dddddddddddddddddddddddddddddddd
dddddddddddddddd
 
Citadel Career Center - Leading the way
Citadel Career Center - Leading the wayCitadel Career Center - Leading the way
Citadel Career Center - Leading the way
 
Uranium!!!!
Uranium!!!!Uranium!!!!
Uranium!!!!
 
A New Entrepreneurship - A Backwards Approach
A New Entrepreneurship - A Backwards ApproachA New Entrepreneurship - A Backwards Approach
A New Entrepreneurship - A Backwards Approach
 

Semelhante a Class4 Security

New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
Shritam Bhowmick
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
Mohsin Ahmad
 
RaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxRaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docx
audeleypearl
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 

Semelhante a Class4 Security (20)

Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
 
information security management
information security managementinformation security management
information security management
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
 
introduction of ethical hacking. ppt
introduction of ethical hacking. pptintroduction of ethical hacking. ppt
introduction of ethical hacking. ppt
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
 
Module 4.pdf
Module 4.pdfModule 4.pdf
Module 4.pdf
 
Module 4 Cyber Security Vulnerabilities& Safe Guards
Module 4 Cyber Security Vulnerabilities& Safe GuardsModule 4 Cyber Security Vulnerabilities& Safe Guards
Module 4 Cyber Security Vulnerabilities& Safe Guards
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
RaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxRaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 

Mais de RMS

2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management
RMS
 
2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management
RMS
 
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans PhotosAmphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
RMS
 
Life Track
Life TrackLife Track
Life Track
RMS
 
Personality Pcm
Personality PcmPersonality Pcm
Personality Pcm
RMS
 
Ob
ObOb
Ob
RMS
 
Perception Pcm P1
Perception Pcm P1Perception Pcm P1
Perception Pcm P1
RMS
 
Intro I Mba Pcm
Intro I Mba PcmIntro I Mba Pcm
Intro I Mba Pcm
RMS
 
The Jim Davis Case
The Jim Davis CaseThe Jim Davis Case
The Jim Davis Case
RMS
 
Perception Pcm P2
Perception Pcm  P2Perception Pcm  P2
Perception Pcm P2
RMS
 
Foundations Of Leadership Pcm
Foundations Of  Leadership PcmFoundations Of  Leadership Pcm
Foundations Of Leadership Pcm
RMS
 
Class3 Edi Ppt
Class3 Edi PptClass3 Edi Ppt
Class3 Edi Ppt
RMS
 
Class2 Business Software
Class2 Business SoftwareClass2 Business Software
Class2 Business Software
RMS
 
Class1 Intro Is
Class1 Intro IsClass1 Intro Is
Class1 Intro Is
RMS
 
Pcm Mngt Acctg Budgetary Control
Pcm   Mngt Acctg   Budgetary ControlPcm   Mngt Acctg   Budgetary Control
Pcm Mngt Acctg Budgetary Control
RMS
 
Pcm Mngt Acctg Conclusion
Pcm   Mngt Acctg ConclusionPcm   Mngt Acctg Conclusion
Pcm Mngt Acctg Conclusion
RMS
 
04 Marketing Concurrence
04 Marketing Concurrence04 Marketing Concurrence
04 Marketing Concurrence
RMS
 
05 Marketing Diagnostic Interne ChaîNe Valeur
05 Marketing Diagnostic Interne ChaîNe Valeur05 Marketing Diagnostic Interne ChaîNe Valeur
05 Marketing Diagnostic Interne ChaîNe Valeur
RMS
 
06 StratéGies GéNéRiques
06 StratéGies GéNéRiques06 StratéGies GéNéRiques
06 StratéGies GéNéRiques
RMS
 
03 Marketing Marché
03 Marketing Marché03 Marketing Marché
03 Marketing Marché
RMS
 

Mais de RMS (20)

2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management
 
2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management
 
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans PhotosAmphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
 
Life Track
Life TrackLife Track
Life Track
 
Personality Pcm
Personality PcmPersonality Pcm
Personality Pcm
 
Ob
ObOb
Ob
 
Perception Pcm P1
Perception Pcm P1Perception Pcm P1
Perception Pcm P1
 
Intro I Mba Pcm
Intro I Mba PcmIntro I Mba Pcm
Intro I Mba Pcm
 
The Jim Davis Case
The Jim Davis CaseThe Jim Davis Case
The Jim Davis Case
 
Perception Pcm P2
Perception Pcm  P2Perception Pcm  P2
Perception Pcm P2
 
Foundations Of Leadership Pcm
Foundations Of  Leadership PcmFoundations Of  Leadership Pcm
Foundations Of Leadership Pcm
 
Class3 Edi Ppt
Class3 Edi PptClass3 Edi Ppt
Class3 Edi Ppt
 
Class2 Business Software
Class2 Business SoftwareClass2 Business Software
Class2 Business Software
 
Class1 Intro Is
Class1 Intro IsClass1 Intro Is
Class1 Intro Is
 
Pcm Mngt Acctg Budgetary Control
Pcm   Mngt Acctg   Budgetary ControlPcm   Mngt Acctg   Budgetary Control
Pcm Mngt Acctg Budgetary Control
 
Pcm Mngt Acctg Conclusion
Pcm   Mngt Acctg ConclusionPcm   Mngt Acctg Conclusion
Pcm Mngt Acctg Conclusion
 
04 Marketing Concurrence
04 Marketing Concurrence04 Marketing Concurrence
04 Marketing Concurrence
 
05 Marketing Diagnostic Interne ChaîNe Valeur
05 Marketing Diagnostic Interne ChaîNe Valeur05 Marketing Diagnostic Interne ChaîNe Valeur
05 Marketing Diagnostic Interne ChaîNe Valeur
 
06 StratéGies GéNéRiques
06 StratéGies GéNéRiques06 StratéGies GéNéRiques
06 StratéGies GéNéRiques
 
03 Marketing Marché
03 Marketing Marché03 Marketing Marché
03 Marketing Marché
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Class4 Security

  • 1. INTRODUCTION TO INFORMATION SYSTEMS SUPdeCO - PCM - English Track October 2008 Computer-Based Information Systems Security PROF. DIANA MANGALAGIU MANAGEMENT AND STRATEGY DEPARTMENT
  • 2. Concept of security «  The security of an information system is its non-vulnerability to accidents or deliberate attacks, that is the impossibility that those attacks have any serious impacts on the state and the operation of the system » J. P. Magnier
  • 3.
  • 4. General definitions Un sinistre Causes of vulnerability Immediate and long-term effects An attack or a natural disaster Disaster : Source: P. Reix
  • 5. S ecurity guidelines : To handle security, it should be assessed using indicators including: 1 – Availability of information and functionalities 2 – Truthfulness of information 3 – Confidentiality of information 4 – Non-repudiation of communications 5 – Traceability of operations Potential causes of the disaster make it essential to keep watch over the vulnerability of the system and thus over the risks it runs. General definitions
  • 6.
  • 7. Security planning Policies for security 1 – Material resource security 2 – Software security 3 – Application security 4 – General security steps 5 – Insurance The idea that security is entirely handled by hardware and software related procedures is a dangerous utopia as it must come with organizational thinking as well as awareness and training of individuals.
  • 8. Four cornerstones of security & trust authentication integrity & non- authorisation confidentiality repudiation
  • 9.
  • 10.
  • 11.
  • 12. Confidentiality Only intended recipient can make sense of message or stored information authentication integrity & non- confidentiality repudiation
  • 13. Authorisation Is the user allowed to perform these operations? authentication integrity & non- authorisation confidentiality repudiation
  • 14.
  • 15.
  • 16.
  • 17.

Notas do Editor

  1. Bouygues Télécom : Sa panne informatique du 17/11/2004 lui coûte 16 millions d’Euros SNCF : 1000 terminaux paralysés en juillet 2004 Selon Microsoft , 2,4 milliards d’heures de travail dans les entreprises ce qui équivaut en France à 20€ de l’heure X 15 millions de personnes = 1,8 milliards d’euros de perte