SlideShare a Scribd company logo
PreparedbyRichardChalamila
1. Several types of security management strategies and defenses and its uses to ensure
the security of business applications of information technology.
i. Place encryption throughout network to ensure privacy – Encryption is a process of
converting message or digital data from plain text which any people can understand to
the cipher text by using special mathematical algorithms, or keys.
This encryption is necessary to be used when the computers is within the network
especially in the internet, extranet and intranet to protect the transmission of messages,
files and passwords.
ii. Use firewall technology for fine-grained security –Firewalls a part of computer system
or network which is designed to block unauthorized access while permitting outward
communication.
This firewalls it act like a gate by providing a password or other security code and it
filter all traffic inward or outward from the computer so it prevent the computer from the
intrusion of viruses and other harmfully hazard.
iii. Authenticate and authorize all network users – Authentication should be handled at
the earliest point of connection of the system to the network: even before the client is
assigned a network address. This combination of authentication and authorization should
form the basis of security policy. Example of authorization is providing Login form by
Password.
iv. Detect threats to the integrity of the network and remediate them –Integrity is to
ensure that the data must be protected from unauthorized, unanticipated, or unintentional
modification. Examples: Census information, economic indicators, or financial
transactions systems.
v. Include End-Point Security in Policy Enforcement – A user who successfully
identifies to the network should be given different privileges depending on the system
they are using for access. Most network managers are already aware of the problem of
end-point security and have tools such as anti-virus, personal firewall, and patch
management in place on many systems.

More Related Content

PDF
Network Security-Module_1.pdf
PPTX
Finance information system
PPT
Information system
PPTX
Information Security Management System ISO/IEC 27001:2005
PDF
Incident Response
PPTX
HealthCare Compliance - HIPAA and HITRUST
PPT
Strategic use of information systems
PDF
Steps in it audit
Network Security-Module_1.pdf
Finance information system
Information system
Information Security Management System ISO/IEC 27001:2005
Incident Response
HealthCare Compliance - HIPAA and HITRUST
Strategic use of information systems
Steps in it audit

What's hot (20)

PPT
Security Architecture
PPTX
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
PPTX
Security management and tools
PPTX
Information System audit
PPTX
Introduction to SIEM.pptx
PPTX
End User Computing
PPTX
Computer based information system
PPT
1. security management practices
PPT
Security audit
PPTX
ISO_ 27001:2022 Controls & Clauses.pptx
PPTX
Threats to information security
PDF
Identity and Access Management 101
PDF
Management information system Unit 1
PPTX
Security Policies and Standards
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
PPT
Mis as a tool in business
PPTX
Security in Windows operating system
PPT
information-security-3rd-edition2-define-information-security.ppt
PDF
Information Security Risk Management
PPTX
OneIdentity - A Future-Ready Approach to IAM
Security Architecture
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
Security management and tools
Information System audit
Introduction to SIEM.pptx
End User Computing
Computer based information system
1. security management practices
Security audit
ISO_ 27001:2022 Controls & Clauses.pptx
Threats to information security
Identity and Access Management 101
Management information system Unit 1
Security Policies and Standards
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Mis as a tool in business
Security in Windows operating system
information-security-3rd-edition2-define-information-security.ppt
Information Security Risk Management
OneIdentity - A Future-Ready Approach to IAM
Ad

Viewers also liked (12)

PDF
Evolution of Security Management
PPT
Security Management Practices
PDF
Ims preview
PPT
PLANT SECURITY
PPTX
PPTX
Top 10 industrial security interview questions with answers
PDF
What is ISO 27001 ISMS
PPT
Information security management
PPTX
Information security management system
PPT
Industrial management
PPTX
Information Security Lecture #1 ppt
PPT
Hospital security services
Evolution of Security Management
Security Management Practices
Ims preview
PLANT SECURITY
Top 10 industrial security interview questions with answers
What is ISO 27001 ISMS
Information security management
Information security management system
Industrial management
Information Security Lecture #1 ppt
Hospital security services
Ad

Similar to Security Management Strategies and Defense and their uses. (20)

PPTX
Unit 1 Network Fundamentals and Security .pptx
PPTX
Computer Security Essentials.pptx
DOC
Network Security Essentials for IT Professionals.doc
DOCX
Security policy case study
DOCX
Seguridad web -articulo completo- ingles
PPTX
Information Systems.pptx
PDF
Best Practices to Secure Your Digital Assets.pdf
PDF
Cyber Security
PDF
Secure Network Access for Manufacturing: Protecting Data and Operations
PPT
Implementing an improved security for collin’s database and telecommuters
PPTX
Computer system security and control-2.pptx
PPT
Information Security Audit and Analysis Module
PDF
CYBERSECURITY FOR REMOTE WORK: BEST PRACTICES FOR PROTECTING YOUR BUSINESS
PPT
Security & control in management information system
PPTX
PDF
Cryptography and Network Security ppt . pdf
DOCX
A network security policy group project unit 4 (1) july 2015
PPTX
Cyber-Security-Unit-1.pptx
PPTX
Module 1.pptx
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
Unit 1 Network Fundamentals and Security .pptx
Computer Security Essentials.pptx
Network Security Essentials for IT Professionals.doc
Security policy case study
Seguridad web -articulo completo- ingles
Information Systems.pptx
Best Practices to Secure Your Digital Assets.pdf
Cyber Security
Secure Network Access for Manufacturing: Protecting Data and Operations
Implementing an improved security for collin’s database and telecommuters
Computer system security and control-2.pptx
Information Security Audit and Analysis Module
CYBERSECURITY FOR REMOTE WORK: BEST PRACTICES FOR PROTECTING YOUR BUSINESS
Security & control in management information system
Cryptography and Network Security ppt . pdf
A network security policy group project unit 4 (1) july 2015
Cyber-Security-Unit-1.pptx
Module 1.pptx
Welcome to International Journal of Engineering Research and Development (IJERD)

Recently uploaded (20)

PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Pharma ospi slides which help in ospi learning
PPTX
master seminar digital applications in india
PPTX
Cell Structure & Organelles in detailed.
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Business Ethics Teaching Materials for college
PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Basic Mud Logging Guide for educational purpose
PDF
01-Introduction-to-Information-Management.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Week 4 Term 3 Study Techniques revisited.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pharma ospi slides which help in ospi learning
master seminar digital applications in india
Cell Structure & Organelles in detailed.
human mycosis Human fungal infections are called human mycosis..pptx
Business Ethics Teaching Materials for college
The Final Stretch: How to Release a Game and Not Die in the Process.
Anesthesia in Laparoscopic Surgery in India
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Basic Mud Logging Guide for educational purpose
01-Introduction-to-Information-Management.pdf
PPH.pptx obstetrics and gynecology in nursing
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
O7-L3 Supply Chain Operations - ICLT Program
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
2.FourierTransform-ShortQuestionswithAnswers.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...

Security Management Strategies and Defense and their uses.

  • 1. PreparedbyRichardChalamila 1. Several types of security management strategies and defenses and its uses to ensure the security of business applications of information technology. i. Place encryption throughout network to ensure privacy – Encryption is a process of converting message or digital data from plain text which any people can understand to the cipher text by using special mathematical algorithms, or keys. This encryption is necessary to be used when the computers is within the network especially in the internet, extranet and intranet to protect the transmission of messages, files and passwords. ii. Use firewall technology for fine-grained security –Firewalls a part of computer system or network which is designed to block unauthorized access while permitting outward communication. This firewalls it act like a gate by providing a password or other security code and it filter all traffic inward or outward from the computer so it prevent the computer from the intrusion of viruses and other harmfully hazard. iii. Authenticate and authorize all network users – Authentication should be handled at the earliest point of connection of the system to the network: even before the client is assigned a network address. This combination of authentication and authorization should form the basis of security policy. Example of authorization is providing Login form by Password. iv. Detect threats to the integrity of the network and remediate them –Integrity is to ensure that the data must be protected from unauthorized, unanticipated, or unintentional modification. Examples: Census information, economic indicators, or financial transactions systems. v. Include End-Point Security in Policy Enforcement – A user who successfully identifies to the network should be given different privileges depending on the system they are using for access. Most network managers are already aware of the problem of end-point security and have tools such as anti-virus, personal firewall, and patch management in place on many systems.