SlideShare a Scribd company logo
2
Most read
4
Most read
5
Most read
It Security
AttacksViruses, Worms, TrojansSpam, Adware, Malware, PhishingHacking is the intentional use of a computer resource without authorization or in excess of authorization.Denial-of-service (DoS) attacks overload victim servers so that they cannot serve users.
AttackersTraditional hackers were curiosity driven.Today’s hackers are criminals that dominate the attack world.On the horizon, cyberterror attacks by terrorist and cyberwar attacks by foreign governments could cause unprecedented levels of damage.
Security ManagementSecurity is primarily a management issue, not a technical issue.Risk Analysis – balancing cost and benefits of protectionComprehensive Security – Closing all avenues of attacks
Access ControlIdentify and list each assetRate the sensitivity of each asset in terms of security riskAccess Control Plan.  Also called Triple AAA.  Authentication, Authorization, and Auditing
Firewalls, IDSs, and IPSsFirewalls examine packets passing through the firewall.Intrusion Detection Systems (IDS) are designed to detect suspicious traffic.Intrusion Prevention Systems (IPS) are used to recognize complex attacks.  It helps prevent false positives.
Host Hardening and Vulnerability TestingServers can be hardened by having vulnerabilities patchedVulnerability Test should be conducted by attacking the network (with permission) , in order to identify security weaknesses.http://www.youtube.com/watch?v=MJNJjh4jORY

More Related Content

PPTX
Cyber security presentation
PPTX
Cyber security
PPT
The ways to protect environment
PPTX
Cybercrime.ppt
PPTX
biosecurity and principles of disease prevention management
PPTX
Convention on Biological Diversity.pptx
PPTX
Robotics presentation
PPTX
Cyber security presentation
Cyber security
The ways to protect environment
Cybercrime.ppt
biosecurity and principles of disease prevention management
Convention on Biological Diversity.pptx
Robotics presentation

What's hot (20)

PDF
Threat Intelligence
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPTX
Cyber Threat Management
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPT
Software security
PPTX
Introduction to penetration testing
PPSX
Intrusion detection system
PPTX
Cyber security
PPTX
Introduction to Cybersecurity Fundamentals
PDF
Introduction to Cybersecurity
PPTX
Dos attack
PPTX
Cyber Security Best Practices
PPTX
PDF
MITRE ATT&CK Framework
PPTX
Cyber security presentation
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PPTX
Cyber Security
PDF
Basics of Cyber Security
Threat Intelligence
Cybersecurity Attack Vectors: How to Protect Your Organization
Application Security | Application Security Tutorial | Cyber Security Certifi...
Cyber Threat Management
VAPT - Vulnerability Assessment & Penetration Testing
Software security
Introduction to penetration testing
Intrusion detection system
Cyber security
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity
Dos attack
Cyber Security Best Practices
MITRE ATT&CK Framework
Cyber security presentation
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cyber Security
Basics of Cyber Security
Ad

Similar to IT Security Presentation (20)

PPT
Essentials Of Security
 
PPTX
vanmathy cryptography network security
PPTX
vanmathy cryptography network security
PDF
Implications of Misuse and Cyber Security.pdf
PDF
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
PDF
IT Security.pdf
PPTX
Basics of System Security and Tools
PPTX
Navigating -the -Cyber-Threat -Landscape
PPTX
Information-security and best pracrices tools for the enhanced security of s...
PPTX
Cyber security
PPT
Ne Course Part Two
PDF
Cybersecurity Dictionary: Your Quick Guide to Essential Terms-Ebook.pdf
PDF
Chapter 2 konsep dasar keamanan
PPTX
System Security- Firewalls and ID System
PDF
The Role of Intrusion Detection Systems in Network Security.pdf
PDF
The Role of Intrusion Detection Systems in Network Security.pdf
DOCX
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill Educat
PPTX
Assess risks to IT security.pptx
PDF
Identity Threat Detection and Response- The Next Big Thing in Cybersecurity.pdf
PDF
Enhanced method for intrusion detection over kdd cup 99 dataset
Essentials Of Security
 
vanmathy cryptography network security
vanmathy cryptography network security
Implications of Misuse and Cyber Security.pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
IT Security.pdf
Basics of System Security and Tools
Navigating -the -Cyber-Threat -Landscape
Information-security and best pracrices tools for the enhanced security of s...
Cyber security
Ne Course Part Two
Cybersecurity Dictionary: Your Quick Guide to Essential Terms-Ebook.pdf
Chapter 2 konsep dasar keamanan
System Security- Firewalls and ID System
The Role of Intrusion Detection Systems in Network Security.pdf
The Role of Intrusion Detection Systems in Network Security.pdf
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill Educat
Assess risks to IT security.pptx
Identity Threat Detection and Response- The Next Big Thing in Cybersecurity.pdf
Enhanced method for intrusion detection over kdd cup 99 dataset
Ad

IT Security Presentation

  • 2. AttacksViruses, Worms, TrojansSpam, Adware, Malware, PhishingHacking is the intentional use of a computer resource without authorization or in excess of authorization.Denial-of-service (DoS) attacks overload victim servers so that they cannot serve users.
  • 3. AttackersTraditional hackers were curiosity driven.Today’s hackers are criminals that dominate the attack world.On the horizon, cyberterror attacks by terrorist and cyberwar attacks by foreign governments could cause unprecedented levels of damage.
  • 4. Security ManagementSecurity is primarily a management issue, not a technical issue.Risk Analysis – balancing cost and benefits of protectionComprehensive Security – Closing all avenues of attacks
  • 5. Access ControlIdentify and list each assetRate the sensitivity of each asset in terms of security riskAccess Control Plan. Also called Triple AAA. Authentication, Authorization, and Auditing
  • 6. Firewalls, IDSs, and IPSsFirewalls examine packets passing through the firewall.Intrusion Detection Systems (IDS) are designed to detect suspicious traffic.Intrusion Prevention Systems (IPS) are used to recognize complex attacks. It helps prevent false positives.
  • 7. Host Hardening and Vulnerability TestingServers can be hardened by having vulnerabilities patchedVulnerability Test should be conducted by attacking the network (with permission) , in order to identify security weaknesses.http://www.youtube.com/watch?v=MJNJjh4jORY