SlideShare a Scribd company logo
4
Most read
6
Most read
7
Most read
IT Security and Other
Issues
Presented By : Sir Haseeb Ahmed
DEFINITION:
• The protection of information and its elements including system,
hardware that use, store and transmit the information
PRIMARY GOALS
CIA triangle known as security triad tells the primary goals of IS
Confidentiality
• Making sure that those who should not see information
Integrity
• Making sure that the information has not been changed from its original
Availability
• Making sure that the information is available for use when you need it.
What is Information Security?
• Known as InfoSec, which is the practice of defending information from unauthorized access,
use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
• It is a general term that can be used regardless of the form the data may take (electronic,
physical, etc...)
• I.T. Security: Sometimes referred to as computer security, Information Technology Security
is information security applied to technology (most often some form of computer system).
• It is worthwhile to note that a computer does not necessarily mean a home desktop. A
computer is any device with a processor and some memory.
• IT security specialists: are almost always found in any major enterprise/establishment due to
the nature and value of the data within larger businesses.
• Information assurance: The act of ensuring that data is not lost when critical issues arise.
• These issues include but are not limited to: natural disasters, computer/server malfunction,
physical theft, or any other instance where data has the potential of being lost.
• Since most information is stored on computers in our modern era, information assurance is
typically dealt with by IT security specialists.
• One of the most common methods of providing information assurance is to have an off-site
backup of the data in case one of the mentioned issues arise.
Threats to Information System?
• There are many information security threats that we need to be constantly aware of and
protect against in order to ensure our sensitive information remains secure.
 Unauthorized Access – Enter at your own risk
 The attempted or successful access of information or systems, without permission or rights to do so.
 Ensure you have a properly configured firewall, up to date malware prevention software and all software has the
latest security updates.
 Protect all sensitive information, utilizing encryption where appropriate, and use strong passwords that are changed
regularly.
 Cyber Espionage – Hey, get off my network!
 The act of spying through the use of computers, involving the covert access or ‘hacking’ of company or
government networks to obtain sensitive information.
 Be alert for social engineering attempts and verify all requests for sensitive information.
 Ensure software has the latest security updates, your network is secure and monitor for unusual network behavior.
 Malware – You installed what?!
 A collective term for malicious software, such as viruses, worms and trojans; designed to infiltrate systems and
information for criminal, commercial or destructive purposes.
 Ensure you have a properly configured firewall, up to date malware prevention and all software has the latest
security updates.
 Do not click links or open attachments in emails from unknown senders, visit un-trusted websites or install dubious
software.
 Data Leakage – I seek what you leak.
 The intentional or accidental loss, theft or exposure of sensitive company or personal information
 Ensure all sensitive information stored on removable storage media, mobile devices or laptops is encrypted
 Be mindful of what you post online, check email recipients before pressing send, and never email sensitive company
information to personal email accounts
Threats to Information System?
 Mobile Device Attack – Lost, but not forgotten.
 The malicious attack on, or unauthorized access of mobile devices and the information stored or processed by them;
performed wirelessly or through physical possession.
 Keep devices with you at all times, encrypt all sensitive data and removable storage media, and use strong
passwords.
 Avoid connecting to insecure, un-trusted public wireless networks and ensure Bluetooth is in ‘undiscoverable’ mode.
 Spam – Email someone else
 Unsolicited email sent in bulk to many individuals, usually for commercial gain, but increasingly for spreading
malware.
 Only give your email to those you trust and never post your address online for others to view.
 Use a spam filter and never reply to spam emails or click links within them.
 Mobile Device Attack – Lost, but not forgotten.
 The theft of an unknowing individual’s personal information, in order to fraudulently assume that individual’s identity
to commit a crime, usually for financial gain.
 Never provide personal information to un-trusted individuals or websites.
 Ensure personal information is protected when stored and securely disposed of when no longer needed.
Protecting Information System
Information Security Controls
Computer security, specifically, is the protection of data in a system against unauthorized
disclosure, modification, or destruction and protection of the computer system itself against
unauthorized use, modification, or denial of service.
Physical Controls
It is the use of locks, security guards, badges, alarms, and similar measures to control access to
computers, related equipment (including utilities), and the processing facility itself.
In addition, measures are required for protecting computers, related equipment, and their
contents from espionage, theft, and destruction or damage by accident, fire, or natural disaster
(e.g., floods and earthquakes).
Technical Controls
Involves the use of safeguards incorporated in computer hardware, operations or applications
software, communications hardware and software, and related devices.
Technical controls are sometimes referred to as logical controls.
Preventive technical controls are used to prevent unauthorized personnel or programs from
gaining remote access to computing resources. Examples of these controls include:
•Access control software
•Antivirus software
•Library control systems
•Passwords
Protecting Information System
• Smart cards
• Encryption
• Dial-up access control and callback systems
Administrative Controls
Consists of management constraints, operational procedures, accountability procedures, and
supplemental administrative controls established to provide an acceptable level of protection
for computing resources.
In addition, administrative controls include procedures established to ensure that all personnel
who have access to computing resources have the required authorizations and appropriate
security clearances.
Preventive administrative controls are personnel-oriented techniques for controlling people’s
behavior to ensure the confidentiality, integrity, and availability of computing data and
programs. Examples of preventive administrative controls include:
• Security awareness and technical training
• Separation of duties
• Procedures for recruiting and terminating employees
• Security policies and procedures
• Supervision.
• Disaster recovery, contingency, and emergency plans
• User registration for computer access
Internet Security?
In 1980 a computer cracked a 3-character password within one minute.
In 1999 a team of computers cracked a 56-character password within one day.
In 2004 a computer virus infected 1 million computers within one hour.
1.Computer Virus:
•Needs a host file
•Copies itself
•Executable
2.Network Worm
•No host (self-contained)
•Copies itself
•Executable
3.Trojan Horse:
•No host (self-contained)
•Does not copy itself
•Imposter Program

More Related Content

PPTX
E commerce and internet in Pakistan
PDF
cyber law and ethics uisng social media .pdf
PPTX
Information Security Lecture #1 ppt
PPT
Blood group ppt
PPTX
Introduction to matplotlib
PPTX
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
PPTX
Relaxation
PPT
Presentation on computer
E commerce and internet in Pakistan
cyber law and ethics uisng social media .pdf
Information Security Lecture #1 ppt
Blood group ppt
Introduction to matplotlib
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Relaxation
Presentation on computer

What's hot (20)

PPTX
Computer security
PPTX
Cyber security
PPTX
Cybersecurity PowerPoint Presentation
PPT
Internet and Networking
PPTX
IT Security Presentation
PPTX
Cyber Security
PDF
Cyber Security
PPTX
Computer Security Presentation
PPT
Transmission Modes in Computer Networks
PPTX
Osi model
PDF
Cyber security
PPTX
Hacking & its types
PPTX
Cyber Security in Society
PPT
Email ppt
PPTX
WWW, Website & Webpage
PPTX
Internet
PPT
Information security in todays world
PPTX
Cyber crime and security
PPTX
Computer security & ethics
Computer security
Cyber security
Cybersecurity PowerPoint Presentation
Internet and Networking
IT Security Presentation
Cyber Security
Cyber Security
Computer Security Presentation
Transmission Modes in Computer Networks
Osi model
Cyber security
Hacking & its types
Cyber Security in Society
Email ppt
WWW, Website & Webpage
Internet
Information security in todays world
Cyber crime and security
Computer security & ethics
Ad

Similar to Information security and other issues (20)

PPTX
InformationSecurity
PPTX
INFORMATION SECURITY SYSTEM
PPTX
Cyber Security and data Security for all.pptx
PPTX
Lecture 3 security threats in data analysis.pptx
PDF
Lecture 01 Information Security BS computer Science
PPTX
sec.This includes policy settings that prevent unauthorized people
PPTX
Computer security ppt for computer science student.pptx
PDF
What-is-Cyber-Security.pdf n
PPTX
information security (network security methods)
PPTX
Information security ist lecture
PPTX
Information Security Bachelor in Information technology unit 1
PPT
Legal and Ethical Considerations in Nursing Informatics
PPTX
IS Unit II.pptx
PPTX
EBRE TABOR UNIVERSITY Gafat Institute of Technology Department of Information...
PPTX
Unit 1 Network Fundamentals and Security .pptx
PPTX
CYBER SECURITY DEFINITION AND TYPES.pptx
PPTX
Data protection and security
PPT
Objective 5 legal consideration in NIS.ppt
PPTX
Cyber crime and security
PPTX
BCE L-3omputer security Basics.pptx
InformationSecurity
INFORMATION SECURITY SYSTEM
Cyber Security and data Security for all.pptx
Lecture 3 security threats in data analysis.pptx
Lecture 01 Information Security BS computer Science
sec.This includes policy settings that prevent unauthorized people
Computer security ppt for computer science student.pptx
What-is-Cyber-Security.pdf n
information security (network security methods)
Information security ist lecture
Information Security Bachelor in Information technology unit 1
Legal and Ethical Considerations in Nursing Informatics
IS Unit II.pptx
EBRE TABOR UNIVERSITY Gafat Institute of Technology Department of Information...
Unit 1 Network Fundamentals and Security .pptx
CYBER SECURITY DEFINITION AND TYPES.pptx
Data protection and security
Objective 5 legal consideration in NIS.ppt
Cyber crime and security
BCE L-3omputer security Basics.pptx
Ad

Recently uploaded (20)

PPTX
Digital Literacy And Online Safety on internet
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Introduction to Information and Communication Technology
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Internet___Basics___Styled_ presentation
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
innovation process that make everything different.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
DOCX
Unit-3 cyber security network security of internet system
PPTX
Funds Management Learning Material for Beg
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
Digital Literacy And Online Safety on internet
introduction about ICD -10 & ICD-11 ppt.pptx
Sims 4 Historia para lo sims 4 para jugar
Introduction to Information and Communication Technology
Slides PDF The World Game (s) Eco Economic Epochs.pdf
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Internet___Basics___Styled_ presentation
Cloud-Scale Log Monitoring _ Datadog.pdf
SAP Ariba Sourcing PPT for learning material
PptxGenJS_Demo_Chart_20250317130215833.pptx
Introuction about WHO-FIC in ICD-10.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
QR Codes Qr codecodecodecodecocodedecodecode
innovation process that make everything different.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline
Tenda Login Guide: Access Your Router in 5 Easy Steps
Unit-3 cyber security network security of internet system
Funds Management Learning Material for Beg
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Job_Card_System_Styled_lorem_ipsum_.pptx

Information security and other issues

  • 1. IT Security and Other Issues Presented By : Sir Haseeb Ahmed
  • 2. DEFINITION: • The protection of information and its elements including system, hardware that use, store and transmit the information PRIMARY GOALS CIA triangle known as security triad tells the primary goals of IS Confidentiality • Making sure that those who should not see information Integrity • Making sure that the information has not been changed from its original Availability • Making sure that the information is available for use when you need it.
  • 3. What is Information Security? • Known as InfoSec, which is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. • It is a general term that can be used regardless of the form the data may take (electronic, physical, etc...) • I.T. Security: Sometimes referred to as computer security, Information Technology Security is information security applied to technology (most often some form of computer system). • It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory. • IT security specialists: are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. • Information assurance: The act of ensuring that data is not lost when critical issues arise. • These issues include but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. • Since most information is stored on computers in our modern era, information assurance is typically dealt with by IT security specialists. • One of the most common methods of providing information assurance is to have an off-site backup of the data in case one of the mentioned issues arise.
  • 4. Threats to Information System? • There are many information security threats that we need to be constantly aware of and protect against in order to ensure our sensitive information remains secure.  Unauthorized Access – Enter at your own risk  The attempted or successful access of information or systems, without permission or rights to do so.  Ensure you have a properly configured firewall, up to date malware prevention software and all software has the latest security updates.  Protect all sensitive information, utilizing encryption where appropriate, and use strong passwords that are changed regularly.  Cyber Espionage – Hey, get off my network!  The act of spying through the use of computers, involving the covert access or ‘hacking’ of company or government networks to obtain sensitive information.  Be alert for social engineering attempts and verify all requests for sensitive information.  Ensure software has the latest security updates, your network is secure and monitor for unusual network behavior.  Malware – You installed what?!  A collective term for malicious software, such as viruses, worms and trojans; designed to infiltrate systems and information for criminal, commercial or destructive purposes.  Ensure you have a properly configured firewall, up to date malware prevention and all software has the latest security updates.  Do not click links or open attachments in emails from unknown senders, visit un-trusted websites or install dubious software.  Data Leakage – I seek what you leak.  The intentional or accidental loss, theft or exposure of sensitive company or personal information  Ensure all sensitive information stored on removable storage media, mobile devices or laptops is encrypted  Be mindful of what you post online, check email recipients before pressing send, and never email sensitive company information to personal email accounts
  • 5. Threats to Information System?  Mobile Device Attack – Lost, but not forgotten.  The malicious attack on, or unauthorized access of mobile devices and the information stored or processed by them; performed wirelessly or through physical possession.  Keep devices with you at all times, encrypt all sensitive data and removable storage media, and use strong passwords.  Avoid connecting to insecure, un-trusted public wireless networks and ensure Bluetooth is in ‘undiscoverable’ mode.  Spam – Email someone else  Unsolicited email sent in bulk to many individuals, usually for commercial gain, but increasingly for spreading malware.  Only give your email to those you trust and never post your address online for others to view.  Use a spam filter and never reply to spam emails or click links within them.  Mobile Device Attack – Lost, but not forgotten.  The theft of an unknowing individual’s personal information, in order to fraudulently assume that individual’s identity to commit a crime, usually for financial gain.  Never provide personal information to un-trusted individuals or websites.  Ensure personal information is protected when stored and securely disposed of when no longer needed.
  • 6. Protecting Information System Information Security Controls Computer security, specifically, is the protection of data in a system against unauthorized disclosure, modification, or destruction and protection of the computer system itself against unauthorized use, modification, or denial of service. Physical Controls It is the use of locks, security guards, badges, alarms, and similar measures to control access to computers, related equipment (including utilities), and the processing facility itself. In addition, measures are required for protecting computers, related equipment, and their contents from espionage, theft, and destruction or damage by accident, fire, or natural disaster (e.g., floods and earthquakes). Technical Controls Involves the use of safeguards incorporated in computer hardware, operations or applications software, communications hardware and software, and related devices. Technical controls are sometimes referred to as logical controls. Preventive technical controls are used to prevent unauthorized personnel or programs from gaining remote access to computing resources. Examples of these controls include: •Access control software •Antivirus software •Library control systems •Passwords
  • 7. Protecting Information System • Smart cards • Encryption • Dial-up access control and callback systems Administrative Controls Consists of management constraints, operational procedures, accountability procedures, and supplemental administrative controls established to provide an acceptable level of protection for computing resources. In addition, administrative controls include procedures established to ensure that all personnel who have access to computing resources have the required authorizations and appropriate security clearances. Preventive administrative controls are personnel-oriented techniques for controlling people’s behavior to ensure the confidentiality, integrity, and availability of computing data and programs. Examples of preventive administrative controls include: • Security awareness and technical training • Separation of duties • Procedures for recruiting and terminating employees • Security policies and procedures • Supervision. • Disaster recovery, contingency, and emergency plans • User registration for computer access
  • 8. Internet Security? In 1980 a computer cracked a 3-character password within one minute. In 1999 a team of computers cracked a 56-character password within one day. In 2004 a computer virus infected 1 million computers within one hour. 1.Computer Virus: •Needs a host file •Copies itself •Executable 2.Network Worm •No host (self-contained) •Copies itself •Executable 3.Trojan Horse: •No host (self-contained) •Does not copy itself •Imposter Program