SlideShare a Scribd company logo
9
Most read
13
Most read
16
Most read
Security concept
1
Outline
• Security concept
1. Introduction
2. Risk management
i. risk response
ii. Exploits
iii. Security controls
iv. Attack vectors
3. Security patterns
i. Identity and access mgt.
ii. Segregation of duties and least privilege
iii. Layered security
iv. cryptography
2
Security (Availability, confidentiality,
integrity)
3
Reason for Crimes
1. Personal exposure and prestige
2. Creating damage
3. Financial gain
4. Terrorism
5. Warfare
4
Risk management
5
definition
Process of determining an acceptable level of risk, accessing the current
level, taking steps to reduce risk to the acceptable level and maintaining
that level.
6
Risk list
1. Asset name
2. Vulnerability
3. Exploit
4. Probability
5. Impact
6. Risk
7
Risk list
8
Risk response
• Decided by senior mgt.
1. Acceptance
2. Avoidance
3. Transfer
4. Mitigation (steps to mitigate)
a) Design for minimum risk
b) Incorporate safety devices
c) Provide warning devices
d) Implement training and procedures
9
Exploits
• Key logger installation.
• Use of network sniffers
• Backup data
• Disposed of PCs and disks
• Corrupt staff can copy the information
• Phishing
10
Security Controls
• Confidentiality
• Integrity
• Availability
11
Attack vector
Attacks on infrastructure can be executed using:
1. Malicious code
2. Denial of services
3. Social engineering
4. phishing
12
1. Malicious code
These are the application that can cause:
1. network and server overload
2. steal data and passwords
3. Erase data
Forms
1. Viruses
2. Trojan horses
3. worms
13
DoS Attack
This is an attempt to overload an infrastructure to cause downtime of a
system.
How to perform DoS attack?
Why we use DDoS attack?
What is botnets?
14
Prevention of DDoS
1. Split business and public resources
2. Use external cloud provider
3. Setup automatic scalability
4. Limit bandwidth for certain traffic
5. Lower the TTL
6. Monitor traffic volume & source and number of request.
15
Prevention of DDoS
Some other actions
1. Immediately inform your internet provider and ask for help.
2. Run connection termination script
3. Change the server
4. Reroute or drop suspected traffic
16
Attack vector
1. Social engineering
2. Phishing
3. Baiting
17
Security Patterns
1. Identity and access management
2. Segregation of duties and least privilege
3. Layered security
4. cryptography
18
1. Identity and access management
It’s a process of managing the identity of people and systems, and their
permissions.
Steps:
1. Identification
2. Authentication
3. Authorization
19
1. Segregation of duties and least privilege
2. Layered security
3. Cryptography
1. Symmetric key encryption
2. Asymmetric key encryption
3. Hash function and digital signature
4. Cryptographic attacks
20

More Related Content

PPTX
08. networking-part-2
PPTX
07. datacenters
PPTX
04. availability-concepts
PPTX
09. storage-part-1
PPTX
01. 03.-introduction-to-infrastructure
PPTX
05. performance-concepts
PPTX
05. performance-concepts-26-slides
PPTX
08. networking
08. networking-part-2
07. datacenters
04. availability-concepts
09. storage-part-1
01. 03.-introduction-to-infrastructure
05. performance-concepts
05. performance-concepts-26-slides
08. networking

What's hot (20)

PPTX
IP tables and Filtering
PPTX
11. operating-systems-part-2
PPT
Chapter03 Creating And Managing User Accounts
PPTX
User and groups administrator
PPT
System Administration: Introduction to system administration
PPTX
12. End user devices.pptx
PPT
Server configuration
PPT
Distributed Systems
PPTX
03. non-functional-attributes-introduction-4-slides
PPT
Distributed Systems
PPT
Protection and Security in Operating Systems
PPTX
System Administration DCU
PPTX
Understanding the Windows Server Administration Fundamentals (Part-1)
PPTX
01. 02. introduction (13 slides)
PPTX
Fundamentals of Servers, server storage and server security.
PPTX
Backup and recovery
PPT
Chapter 6-Consistency and Replication.ppt
PPTX
Data backup and disaster recovery
PPTX
10. compute-part-1
PPTX
User authentication
 
IP tables and Filtering
11. operating-systems-part-2
Chapter03 Creating And Managing User Accounts
User and groups administrator
System Administration: Introduction to system administration
12. End user devices.pptx
Server configuration
Distributed Systems
03. non-functional-attributes-introduction-4-slides
Distributed Systems
Protection and Security in Operating Systems
System Administration DCU
Understanding the Windows Server Administration Fundamentals (Part-1)
01. 02. introduction (13 slides)
Fundamentals of Servers, server storage and server security.
Backup and recovery
Chapter 6-Consistency and Replication.ppt
Data backup and disaster recovery
10. compute-part-1
User authentication
 
Ad

Viewers also liked (11)

PPT
Chapter05
PPT
Chapter01
PPT
Chapter06
PPT
Chapter14
PPT
Chapter02
PPTX
Chapter04
PPTX
11. operating-systems-part-1
PPT
Chapter13
PPT
Chapter03
PPTX
10. compute-part-2
PPT
Artificial Intelligence
Chapter05
Chapter01
Chapter06
Chapter14
Chapter02
Chapter04
11. operating-systems-part-1
Chapter13
Chapter03
10. compute-part-2
Artificial Intelligence
Ad

Similar to 06. security concept (20)

PPTX
Threats and vulnerability , a danger to our valuable data and information.pptx
PPTX
Threat modelling with_sample_application
DOCX
cybersecurity 101 conducted by GDG on campus SUIIT
PPTX
Malware analysis final.pptx in cybersecuriey
PPTX
(046) IS.pptx taxation on withholding statement
PPTX
Information Systems.pptx
PPTX
LIFT OFF 2017: Ransomware and IR Overview
PPTX
CIA Triad In Information Security : Cyber
PDF
Management Information Systems
PPTX
Cyber Security
PPTX
Incident-Response-and-Recovery and cloud security.pptx
PDF
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
PDF
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
PPTX
Cybersecurity_Essentials (1).pptx|cyber essentials
PDF
Network security chapter 1,2
PDF
Secure remote work
PPTX
Navigating-the-Digital-Frontier-A-Guide-to-Cyber-Security Surojit.pptx.pptx
PPTX
Computer Security Essentials.pptx
PDF
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
PPT
Information Technology Security Basics
Threats and vulnerability , a danger to our valuable data and information.pptx
Threat modelling with_sample_application
cybersecurity 101 conducted by GDG on campus SUIIT
Malware analysis final.pptx in cybersecuriey
(046) IS.pptx taxation on withholding statement
Information Systems.pptx
LIFT OFF 2017: Ransomware and IR Overview
CIA Triad In Information Security : Cyber
Management Information Systems
Cyber Security
Incident-Response-and-Recovery and cloud security.pptx
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
Cybersecurity_Essentials (1).pptx|cyber essentials
Network security chapter 1,2
Secure remote work
Navigating-the-Digital-Frontier-A-Guide-to-Cyber-Security Surojit.pptx.pptx
Computer Security Essentials.pptx
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Information Technology Security Basics

More from Muhammad Ahad (7)

PPT
Chapter12
PPT
Chapter11
PPT
Chapter10
PPT
Chapter09
PPT
Chapter08
PPT
Chapter07
PPT
Artificial Intelligence
Chapter12
Chapter11
Chapter10
Chapter09
Chapter08
Chapter07
Artificial Intelligence

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Tartificialntelligence_presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
August Patch Tuesday
PPTX
Machine Learning_overview_presentation.pptx
Spectral efficient network and resource selection model in 5G networks
SOPHOS-XG Firewall Administrator PPT.pptx
Unlocking AI with Model Context Protocol (MCP)
Advanced methodologies resolving dimensionality complications for autism neur...
Getting Started with Data Integration: FME Form 101
Tartificialntelligence_presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Reach Out and Touch Someone: Haptics and Empathic Computing
Building Integrated photovoltaic BIPV_UPV.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
cloud_computing_Infrastucture_as_cloud_p
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Weekly Chronicles - August'25-Week II
MIND Revenue Release Quarter 2 2025 Press Release
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Group 1 Presentation -Planning and Decision Making .pptx
Assigned Numbers - 2025 - Bluetooth® Document
August Patch Tuesday
Machine Learning_overview_presentation.pptx

06. security concept

  • 2. Outline • Security concept 1. Introduction 2. Risk management i. risk response ii. Exploits iii. Security controls iv. Attack vectors 3. Security patterns i. Identity and access mgt. ii. Segregation of duties and least privilege iii. Layered security iv. cryptography 2
  • 4. Reason for Crimes 1. Personal exposure and prestige 2. Creating damage 3. Financial gain 4. Terrorism 5. Warfare 4
  • 6. definition Process of determining an acceptable level of risk, accessing the current level, taking steps to reduce risk to the acceptable level and maintaining that level. 6
  • 7. Risk list 1. Asset name 2. Vulnerability 3. Exploit 4. Probability 5. Impact 6. Risk 7
  • 9. Risk response • Decided by senior mgt. 1. Acceptance 2. Avoidance 3. Transfer 4. Mitigation (steps to mitigate) a) Design for minimum risk b) Incorporate safety devices c) Provide warning devices d) Implement training and procedures 9
  • 10. Exploits • Key logger installation. • Use of network sniffers • Backup data • Disposed of PCs and disks • Corrupt staff can copy the information • Phishing 10
  • 11. Security Controls • Confidentiality • Integrity • Availability 11
  • 12. Attack vector Attacks on infrastructure can be executed using: 1. Malicious code 2. Denial of services 3. Social engineering 4. phishing 12
  • 13. 1. Malicious code These are the application that can cause: 1. network and server overload 2. steal data and passwords 3. Erase data Forms 1. Viruses 2. Trojan horses 3. worms 13
  • 14. DoS Attack This is an attempt to overload an infrastructure to cause downtime of a system. How to perform DoS attack? Why we use DDoS attack? What is botnets? 14
  • 15. Prevention of DDoS 1. Split business and public resources 2. Use external cloud provider 3. Setup automatic scalability 4. Limit bandwidth for certain traffic 5. Lower the TTL 6. Monitor traffic volume & source and number of request. 15
  • 16. Prevention of DDoS Some other actions 1. Immediately inform your internet provider and ask for help. 2. Run connection termination script 3. Change the server 4. Reroute or drop suspected traffic 16
  • 17. Attack vector 1. Social engineering 2. Phishing 3. Baiting 17
  • 18. Security Patterns 1. Identity and access management 2. Segregation of duties and least privilege 3. Layered security 4. cryptography 18
  • 19. 1. Identity and access management It’s a process of managing the identity of people and systems, and their permissions. Steps: 1. Identification 2. Authentication 3. Authorization 19
  • 20. 1. Segregation of duties and least privilege 2. Layered security 3. Cryptography 1. Symmetric key encryption 2. Asymmetric key encryption 3. Hash function and digital signature 4. Cryptographic attacks 20