SlideShare a Scribd company logo
Mis jaiswal-chapter-11




The protection of information systems
against unauthorized access to or
modification of information, whether in
storage, processing or transit, and against
the denial of service to authorized users or
the provision of service to unauthorized
users, including those measures necessary to
detect, document, and counter such threats
The result of any system of administrative
policies and procedures for identifying,
controlling, and protecting from
unauthorized disclosure, information the
protection of which is authorized by
executive order


Information Security Management provides:

- a systematic approach to achieving effective

information security within an organization;
- a realistic understanding of information security risks
and issues facing organizations; and
effective techniques for matching information security
requirements with business requirements.
- consists of various facets : security policy, risk analysis,
risk management, contingency planning, and disaster
recovery
Information Security Threats
Software agents and malicious code
Virus :
A program which gets executed when ever a
program is run on computer

Trojan Horse :
A program which does its supposed job but also
includes unsuspected and undesirable
functions. e. g. deletion of desirable items

Worm :
A self replicating program, creates its own
copies and executes, works in networks.
Information Security Threats
contd
Threats to Servers on Networks
Hackers have potential access to large systems
with prospects of security holes
Hackers use popular UNIX programs to discover
account names and guess passwords
Hackers can use electronic eavesdropping to
trap user and un-encrypted passwords
Hackers can spoof or configure a system to
mimic some other system
Security Architecture
Business
Data and application security
Network Security
Authentication and Authorization
Physical Security
Procedural Security

External World
Information Security Architecture
Information Security
Authentication Message received by B has
actually come from A

Confidentiality Message is secured and not seen
by any snooper

Integrity

Message has not been distorted by
accident or design

Non repudiation B can make A legally responsible
for the message
Information Security

A

B
A sends a message to B
Information Security contd
Encryption and Decryption Technology
Transfer Rs. 10,000 to the account of X
Encrypt
bjqhiudiiodo
Send
Decrypt

Receive

Transfer Rs. 10,000 to the account of X
Information Security contd
Symmetric Encryption :
The sender encrypts a message by using a secret key
and
the receiver uses the same key for decryption
Useful where two parties are well known
Difficulties in sharing the keys especially in large
networks

DATA ENCRYPTION STANDARD ( DES )
• Secret Key, Symmetric Encryption
• 56 bit secret key which means 2^56 possibilities
(56 Bit DES recently broken in a few hours, 128 bit Okay)
• Triple DES uses 112 bit key
• Bigger the bit size larger amount it takes for decryption
Information Security contd
Public and Private Key encryption
Message

Decrypted with B’s private key

B

A
Encrypted with B’s public
key

Message

Both parties have one public key and one private key each
The public keys are known to each other, Private key is not.
Message is encrypted using B’s public key
It can be opened only when B uses its private key
CONFIDENTIALITY IS ENSURED

RSA ( Rivest Shamir Adleman) algorithm for public key 768 bit
RSA considered safe presently
Information Security contd
Public and Private Key encryption
Message
Encrypted with B’s public key

A

Decrypted with
A’s public key and
B’s private key
Message

B

Encrypted with A’s private key

Message is encrypted using B’s public key.
The packet of the message encrypted with B’s public key is further
encrypted by A using A’s private key.
It can be opened only when B uses the public key of A and its own
private key
CONFIDENTIALITY AND AUTHENTICITY IS ENSURED
Information Security contd
Digital signature and public key encryption

Message
Digital Signature using A’s
private key

Encryption with A’s private key
Encrypted with B’s Public Key

Digital Signature A Sum check number called
finger print (like Message
Authentication Code (MAC) as
used in banking industry) which
is included in the message to
ensure INTEGRITY

CONFIDENTIALITY, INTEGRITY AND AUTHENTICITY ENSURED
BUT REPUDIATION POSSIBLE
Information Security

contd

Digital Certificate
Issued by Certifying Authority links
the person with his public and private
key Standard X.509

VERSION
Certificate Serial No.
Signature Algorithm ID.
ISSUER

C.A.PRIVATE
KEY

VALIDITY Period
Subject
Subject Public KEY INFO.
ISSUER Unique Identifier

GENERATE
DIGITAL
SIGNATURE

Subject Unique Identifier

Extensions
C.A.DIGITAL Signature
Information Security contd
Public Key Infrastructure
Set of agreed upon standards, certification
authorities, structure between multiple authorities,
methods to discover and validate certification
paths,operational protocols, management protocols,
inter operable tools and supporting legislature

PKI Issues : Regulation
• Governments are producing legislation to govern
e-commerce
• Who regulates Certification Authorities
• C A Liability
• Revocation of certificates
Internet Security
• Internet provides global reach at very low
cost and
high speed but is not secure due to its inherent
weakness in TCP/IP
• Growth of the Internet Exponential results in
a rise
of security incidents
• Most ISP and user organisations use public
domain
software such as LINUX, Apache for Internet
that
are more prone to security threads
• Default network OS setting and access to
Security Threats to Internet
Types of Attack
• Password - Based Attack
- cracking, FTP, Telnet, etc/password
• IP Spoofing
- TCP/IP allows anyone to generate a message
claiming to be another machine
• Session Hijacking
- special type of IP Spoofing which an intruder is
able to determine the sequence used between
two parties
• Network Snooping / Packet sniffing Packets can easily
be intercepted at any point in the network
Internet Security
Web
Network level - Firewall
server
FTP server

External
Users
Inside

Gopher
server

Inbound traffic from the Internet to the internal
network
Outbound traffic from the internal network
Inbound traffic from the Internet to public services
Internet Security
Technology
Operational Technology
•One-Time passwords
•Network Monitoring Tools
•Network Security Analysis Tools
•Firewalls

Cryptography Policy based Technology
•Digital Signature
•PKI Policy
Security Architecture
Network Security - Firewall

More Related Content

PPTX
Security Mechanisms
PPTX
Security services
PPTX
Security in e commerce
PPT
E-Commerce Security
PPT
Chapter 01
PPTX
Ppt.1
PPTX
Network security & cryptography
PPTX
Types of attacks
Security Mechanisms
Security services
Security in e commerce
E-Commerce Security
Chapter 01
Ppt.1
Network security & cryptography
Types of attacks

What's hot (20)

PPTX
Cybersecurity service provider
PDF
Network security chapter 1
PDF
3 f6 security
PDF
Network security - OSI Security Architecture
PPTX
Cryptographic Security
PPT
Network Security 1st Lecture
PDF
Intrusion in computing
PPT
Information System Security introduction
PPT
Technical seminar on Security
PPTX
Data and Message Security
PPTX
Network security
PPTX
Data Network Security
PDF
Network security for E-Commerce
PPT
Infomation System Security
PPTX
Networking infrastructure
PDF
CNS - Chapter1
PDF
BAIT1103 Chapter 1
PPT
this is test for today
PPTX
Network security
Cybersecurity service provider
Network security chapter 1
3 f6 security
Network security - OSI Security Architecture
Cryptographic Security
Network Security 1st Lecture
Intrusion in computing
Information System Security introduction
Technical seminar on Security
Data and Message Security
Network security
Data Network Security
Network security for E-Commerce
Infomation System Security
Networking infrastructure
CNS - Chapter1
BAIT1103 Chapter 1
this is test for today
Network security
Ad

Viewers also liked (9)

PPT
Joint ventures and strategic alliances
PDF
Operationsmanagement 919slidespresentation-090928145353-phpapp01
PDF
Business Opportunity Presentation
PPT
S4 starmatching
PDF
CII continuous improvement aug13
PPTX
Mis jaiswal-chapter-09
PDF
Selenium私房菜(新手入门教程)
PPTX
Aditya birla
PPT
Chapter 20 hr new
Joint ventures and strategic alliances
Operationsmanagement 919slidespresentation-090928145353-phpapp01
Business Opportunity Presentation
S4 starmatching
CII continuous improvement aug13
Mis jaiswal-chapter-09
Selenium私房菜(新手入门教程)
Aditya birla
Chapter 20 hr new
Ad

Similar to Mis jaiswal-chapter-11 (20)

PPT
information security importance and use.ppt
PPT
formintroduction to ISF.ppt ination security fundamentals
PPT
Lecture15.ppt
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
PPTX
Network security & cryptography
PPTX
INTERNETSECURITY with the different threats
PPTX
Chapter 1 information assurance and security
PPTX
2 second lectuer theory princible security.pptx
PPT
Security
PPTX
unit -I PPt.pptxsacdACFDSGFDGZfxtfyytrfufjgdx
DOCX
CCS354-NETWORK SECURITY-network-security notes
PPTX
Cyber security
PPTX
6 security
PPTX
Information Security and Indian IT Act 2000
PPTX
Information Security and Privacy-Unit-2.pptx
PPT
security issue
PPT
Lesson 2 Cryptography tools
PDF
Information Security Imp +Past Paper.pdf
PDF
Cryptography-PART-1.pdf,taught in nitw 2025
information security importance and use.ppt
formintroduction to ISF.ppt ination security fundamentals
Lecture15.ppt
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
Network security & cryptography
INTERNETSECURITY with the different threats
Chapter 1 information assurance and security
2 second lectuer theory princible security.pptx
Security
unit -I PPt.pptxsacdACFDSGFDGZfxtfyytrfufjgdx
CCS354-NETWORK SECURITY-network-security notes
Cyber security
6 security
Information Security and Indian IT Act 2000
Information Security and Privacy-Unit-2.pptx
security issue
Lesson 2 Cryptography tools
Information Security Imp +Past Paper.pdf
Cryptography-PART-1.pdf,taught in nitw 2025

More from Amit Fogla (20)

PPT
Section 3 chapter 21 - financial management - teaching aid
PPT
Ppt01
PPT
Erp overview
PPT
Competitive strategies in different types of industries
PPT
The new venture exploration plan
PPT
Csr13 5(imple)
PDF
Session rural marketing final
PPT
Student presentation
PPTX
Mis jaiswal-chapter-13
PPT
Environmental analysis
PPS
Chapter37 internationalfinancialmanagement
PPTX
Mis jaiswal-chapter-05
PPTX
Mis jaiswal-chapter-10
PPTX
Mis jaiswal-chapter-03
PPTX
Mis jaiswal-chapter-04
PPTX
Mis jaiswal-chapter-12
PPTX
Mis jaiswal-chapter-08
PPT
PPTX
Mis jaiswal-chapter-06
PPTX
Mis jaiswal-chapter-02
Section 3 chapter 21 - financial management - teaching aid
Ppt01
Erp overview
Competitive strategies in different types of industries
The new venture exploration plan
Csr13 5(imple)
Session rural marketing final
Student presentation
Mis jaiswal-chapter-13
Environmental analysis
Chapter37 internationalfinancialmanagement
Mis jaiswal-chapter-05
Mis jaiswal-chapter-10
Mis jaiswal-chapter-03
Mis jaiswal-chapter-04
Mis jaiswal-chapter-12
Mis jaiswal-chapter-08
Mis jaiswal-chapter-06
Mis jaiswal-chapter-02

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation theory and applications.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Approach and Philosophy of On baking technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Advanced methodologies resolving dimensionality complications for autism neur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
20250228 LYD VKU AI Blended-Learning.pptx
Empathic Computing: Creating Shared Understanding
Encapsulation theory and applications.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
“AI and Expert System Decision Support & Business Intelligence Systems”
sap open course for s4hana steps from ECC to s4
Per capita expenditure prediction using model stacking based on satellite ima...
Network Security Unit 5.pdf for BCA BBA.
Approach and Philosophy of On baking technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Mis jaiswal-chapter-11

  • 2.   The protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats The result of any system of administrative policies and procedures for identifying, controlling, and protecting from unauthorized disclosure, information the protection of which is authorized by executive order
  • 3.  Information Security Management provides: - a systematic approach to achieving effective information security within an organization; - a realistic understanding of information security risks and issues facing organizations; and effective techniques for matching information security requirements with business requirements. - consists of various facets : security policy, risk analysis, risk management, contingency planning, and disaster recovery
  • 4. Information Security Threats Software agents and malicious code Virus : A program which gets executed when ever a program is run on computer Trojan Horse : A program which does its supposed job but also includes unsuspected and undesirable functions. e. g. deletion of desirable items Worm : A self replicating program, creates its own copies and executes, works in networks.
  • 5. Information Security Threats contd Threats to Servers on Networks Hackers have potential access to large systems with prospects of security holes Hackers use popular UNIX programs to discover account names and guess passwords Hackers can use electronic eavesdropping to trap user and un-encrypted passwords Hackers can spoof or configure a system to mimic some other system
  • 6. Security Architecture Business Data and application security Network Security Authentication and Authorization Physical Security Procedural Security External World
  • 7. Information Security Architecture Information Security Authentication Message received by B has actually come from A Confidentiality Message is secured and not seen by any snooper Integrity Message has not been distorted by accident or design Non repudiation B can make A legally responsible for the message
  • 9. Information Security contd Encryption and Decryption Technology Transfer Rs. 10,000 to the account of X Encrypt bjqhiudiiodo Send Decrypt Receive Transfer Rs. 10,000 to the account of X
  • 10. Information Security contd Symmetric Encryption : The sender encrypts a message by using a secret key and the receiver uses the same key for decryption Useful where two parties are well known Difficulties in sharing the keys especially in large networks DATA ENCRYPTION STANDARD ( DES ) • Secret Key, Symmetric Encryption • 56 bit secret key which means 2^56 possibilities (56 Bit DES recently broken in a few hours, 128 bit Okay) • Triple DES uses 112 bit key • Bigger the bit size larger amount it takes for decryption
  • 11. Information Security contd Public and Private Key encryption Message Decrypted with B’s private key B A Encrypted with B’s public key Message Both parties have one public key and one private key each The public keys are known to each other, Private key is not. Message is encrypted using B’s public key It can be opened only when B uses its private key CONFIDENTIALITY IS ENSURED RSA ( Rivest Shamir Adleman) algorithm for public key 768 bit RSA considered safe presently
  • 12. Information Security contd Public and Private Key encryption Message Encrypted with B’s public key A Decrypted with A’s public key and B’s private key Message B Encrypted with A’s private key Message is encrypted using B’s public key. The packet of the message encrypted with B’s public key is further encrypted by A using A’s private key. It can be opened only when B uses the public key of A and its own private key CONFIDENTIALITY AND AUTHENTICITY IS ENSURED
  • 13. Information Security contd Digital signature and public key encryption Message Digital Signature using A’s private key Encryption with A’s private key Encrypted with B’s Public Key Digital Signature A Sum check number called finger print (like Message Authentication Code (MAC) as used in banking industry) which is included in the message to ensure INTEGRITY CONFIDENTIALITY, INTEGRITY AND AUTHENTICITY ENSURED BUT REPUDIATION POSSIBLE
  • 14. Information Security contd Digital Certificate Issued by Certifying Authority links the person with his public and private key Standard X.509 VERSION Certificate Serial No. Signature Algorithm ID. ISSUER C.A.PRIVATE KEY VALIDITY Period Subject Subject Public KEY INFO. ISSUER Unique Identifier GENERATE DIGITAL SIGNATURE Subject Unique Identifier Extensions C.A.DIGITAL Signature
  • 15. Information Security contd Public Key Infrastructure Set of agreed upon standards, certification authorities, structure between multiple authorities, methods to discover and validate certification paths,operational protocols, management protocols, inter operable tools and supporting legislature PKI Issues : Regulation • Governments are producing legislation to govern e-commerce • Who regulates Certification Authorities • C A Liability • Revocation of certificates
  • 16. Internet Security • Internet provides global reach at very low cost and high speed but is not secure due to its inherent weakness in TCP/IP • Growth of the Internet Exponential results in a rise of security incidents • Most ISP and user organisations use public domain software such as LINUX, Apache for Internet that are more prone to security threads • Default network OS setting and access to
  • 17. Security Threats to Internet Types of Attack • Password - Based Attack - cracking, FTP, Telnet, etc/password • IP Spoofing - TCP/IP allows anyone to generate a message claiming to be another machine • Session Hijacking - special type of IP Spoofing which an intruder is able to determine the sequence used between two parties • Network Snooping / Packet sniffing Packets can easily be intercepted at any point in the network
  • 18. Internet Security Web Network level - Firewall server FTP server External Users Inside Gopher server Inbound traffic from the Internet to the internal network Outbound traffic from the internal network Inbound traffic from the Internet to public services
  • 19. Internet Security Technology Operational Technology •One-Time passwords •Network Monitoring Tools •Network Security Analysis Tools •Firewalls Cryptography Policy based Technology •Digital Signature •PKI Policy