SlideShare a Scribd company logo
Risk and security
related concepts.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– The big picture of recovery.
– Concepts and terms.
PACE-IT.
Page 4
Risk and security related concepts.
Page 5
Standards and policies are
used to help ensure that
everyone is on the same
page at the same time.
All organizations should review their operations and create
standards and policies that suit their needs. Once they are
created, the standards and policies should be adhered to.
By stressing the importance of standards and policies, risks to an
organization can be reduced and security can be strengthened.
All policies and standards should be reviewed on a periodic basis
to help ensure that they remain relevant and be updated as
necessary.
Risk and security related concepts.
Page 6
– Disaster recovery plan (DRP).
» A disaster is any event or emergency that goes beyond the
normal response resources (e.g., earthquake or flood).
• The longer a business is not able to function, the more
damage is done.
» DRPs detail the steps to recover from a disaster situation (e.g.,
offsite backups and fallback sites).
• They also have sections dealing with how to help ensure
employee safety.
– Business continuity plan (BCP).
» A sub-element of the DRP, a BCP includes an impact analysis
of the business effects of down systems.
• The impact analysis helps to identify single points of failure in
the business system.
» A BCP helps to prioritize what systems or processes need to
be brought back first to get the organization operational again.
• It identifies mission critical systems, processes, and data.
» A BCP helps to guide the creation of the DRP.
Risk and security related concepts.
Page 7
Risk and security related concepts.
Page 8
– Single point of failure.
» A single point of failure is a system or component that, if it goes
down, has a major impact on operations (e.g., a key router that
fails and prevents customers from ordering products).
» Once identified, these failure points can be mitigated through
several different methods such as:
• Redundant systems (e.g., a backup router or redundant
power supply).
• System redesign (e.g., removal of the point of failure through
a redesign of the system (e.g., adding an additional router).
– UPS (uninterruptable power supply).
» A UPS will mitigate power issues that can have a negative
impact on sensitive networking components.
• Conditions the incoming power to remove spikes and sags in
the current, ensuring that the current flow is even.
• Helps to ensure continued operation for a given period of time
in the case of complete electrical power supply loss).
Risk and security related concepts.
Page 9
– First responders.
» The first people to discover or respond to the security issue.
• Ideally, it will be someone who has been properly trained in
how to deal with the situation.
» Within the network security realm, first responders can play a
key role in mitigating damage and collecting evidence.
– Data breach.
» Any unauthorized access to data, particularly to sensitive data.
• Breaches may be unintentional or intentional.
• Breaches may occur internally or externally.
» The severity of the breach is greatly determined by the
sensitivity of the data accessed.
» Data breaches can be very expensive to organizations.
• Loss of reputation, which can lead to loss of revenue.
• Loss of business secrets.
• Fines or penalties levied by governments or other
organizations.
Risk and security related concepts.
Page 10
Risk and security related concepts.
User awareness and training.
Greatly reducing
security risks.
Quite often, the weakest link in the
security chain is the users. The risks
can be reduced by making the users
properly aware of security and
security threats.
Penetration testing.
Finding weak spots and
hardening the system.
Actively and aggressively testing the
whole IT system in an effort to find
weak spots. This can include using
social engineering methods. The
data generated is used to harden the
IT system to mitigate risk.
Vulnerability scanning.
Finding network holes
and plugging them.
Mostly done through the use of
automated software, networks are
probed for vulnerabilities (e.g., open
ports or protocols). Once identified,
these holes into the network can be
plugged.
Page 11
Risk and security related concepts.
Organizations should establish and enforce standards and policies. These
will help to mitigate any risks. DRPs are developed and used to help
recover from a disaster. A BCP is a sub-element of a DRP. They identify
systems and components that are mission critical to an organization and
create plans to mitigate the loss of those identified elements.
Topic
The big picture of recovery.
Summary
A single point of failure is when there is a single point where a failure would
create business discontinuity. Network administrators strive to remove them
from their systems. A UPS is used to mitigate power issues. First
responders are the people who first notice and respond to security issues.
Ideally, the first responder will have been properly trained. A data breach is
any unauthorized access to an organization's data. User awareness and
training is used to mitigate risks associated at the user level. Penetration
testing is the review of a whole system looking for weaknesses that can
then be hardened. Vulnerability scanning is usually an automated process
that looks for weaknesses in networks so that any holes can be plugged.
Concepts and terms.
Page 12
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT: Common Threats (part 2)
PPTX
PACE-IT: Physical Network Security Control
PPTX
PACE-IT: Common Threats (part 1)
PPTX
PACE-IT: Common Network Vulnerabilities
PPTX
PACE-IT: Basic Forensic Concepts
PPTX
PACE-IT: Common Network Security Issues
PPTX
PACE-IT: Network Hardening Techniques (part 1)
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT: Common Threats (part 2)
PACE-IT: Physical Network Security Control
PACE-IT: Common Threats (part 1)
PACE-IT: Common Network Vulnerabilities
PACE-IT: Basic Forensic Concepts
PACE-IT: Common Network Security Issues
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)

What's hot (20)

PPTX
PACE-IT: Network Hardening Techniques (part 3)
PPTX
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PPTX
PACE-IT, Security+1.2: Secure Network Administration Concepts
PPTX
PACE-IT: Network Hardening Techniques (part 2)
PPTX
PACE-IT, Security+1.3: Cloud Concepts
PPTX
PACE-IT: Network Access Control
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PPTX
PACE-IT, Security+2.6: Security Related Awareness and Training
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
PPTX
PACE-IT, Security+2.8: Risk Management Best Practices
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PPTX
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PPTX
PACE-IT: Firewall Basics
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PPTX
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PPTX
Pace IT - Common Security Threats
PPTX
PACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT: Network Hardening Techniques (part 3)
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT, Security+1.3: Cloud Concepts
PACE-IT: Network Access Control
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT: Firewall Basics
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+ 2.4: Basic Forensic Procedures
Pace IT - Common Security Threats
PACE-IT, Security+1.5: Wireless Security Considerations
Ad

Viewers also liked (8)

PDF
Security Awareness
PPT
5.4 it security audit (mauritius)
PDF
It Security Audit Process
PPT
The information security audit
PPT
Introduction to Information Security
PPTX
Information Security Lecture #1 ppt
PPTX
Audit presentation
PPTX
INFORMATION SECURITY
Security Awareness
5.4 it security audit (mauritius)
It Security Audit Process
The information security audit
Introduction to Information Security
Information Security Lecture #1 ppt
Audit presentation
INFORMATION SECURITY
Ad

Similar to PACE-IT: Risk and Security Related Concepts (20)

PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PPTX
PACE-IT, Security+2.8: Disaster Recovery Concepts
PPT
CCNA Security - Chapter 9
PPT
Network security
PPTX
Robert Williams Final Project
PPTX
Robert Williams Final Project
PDF
Network Security Research Paper
PPSX
1 Info Sec+Risk Mgmt
PPTX
PACE-IT, Security+ 2.5: Incident Response Concepts
PDF
Information security for dummies
PPSX
4 Operations Security
PPT
Cyber crime with privention
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
PDF
7. Security Operations
PPTX
What is dr and bc 12-2017
PPTX
Pace IT - Threats & Vulnerabilities Mitigation
PDF
CNIT 125 Ch 8. Security Operations
PPTX
Database development and security certification and accreditation plan pitwg
PDF
Why Traditional Security has Failed
PDF
CISSP Prep: Ch 8. Security Operations
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+2.8: Disaster Recovery Concepts
CCNA Security - Chapter 9
Network security
Robert Williams Final Project
Robert Williams Final Project
Network Security Research Paper
1 Info Sec+Risk Mgmt
PACE-IT, Security+ 2.5: Incident Response Concepts
Information security for dummies
4 Operations Security
Cyber crime with privention
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
7. Security Operations
What is dr and bc 12-2017
Pace IT - Threats & Vulnerabilities Mitigation
CNIT 125 Ch 8. Security Operations
Database development and security certification and accreditation plan pitwg
Why Traditional Security has Failed
CISSP Prep: Ch 8. Security Operations

More from Pace IT at Edmonds Community College (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

Recently uploaded (20)

PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
RMMM.pdf make it easy to upload and study
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
Cell Types and Its function , kingdom of life
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Lesson notes of climatology university.
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Complications of Minimal Access Surgery at WLH
Unit 4 Skeletal System.ppt.pptxopresentatiom
Final Presentation General Medicine 03-08-2024.pptx
Final Presentation General Medicine 03-08-2024.pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Supply Chain Operations Speaking Notes -ICLT Program
RMMM.pdf make it easy to upload and study
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
What if we spent less time fighting change, and more time building what’s rig...
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Cell Types and Its function , kingdom of life
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Lesson notes of climatology university.
Digestion and Absorption of Carbohydrates, Proteina and Fats
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE

PACE-IT: Risk and Security Related Concepts

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – The big picture of recovery. – Concepts and terms. PACE-IT.
  • 4. Page 4 Risk and security related concepts.
  • 5. Page 5 Standards and policies are used to help ensure that everyone is on the same page at the same time. All organizations should review their operations and create standards and policies that suit their needs. Once they are created, the standards and policies should be adhered to. By stressing the importance of standards and policies, risks to an organization can be reduced and security can be strengthened. All policies and standards should be reviewed on a periodic basis to help ensure that they remain relevant and be updated as necessary. Risk and security related concepts.
  • 6. Page 6 – Disaster recovery plan (DRP). » A disaster is any event or emergency that goes beyond the normal response resources (e.g., earthquake or flood). • The longer a business is not able to function, the more damage is done. » DRPs detail the steps to recover from a disaster situation (e.g., offsite backups and fallback sites). • They also have sections dealing with how to help ensure employee safety. – Business continuity plan (BCP). » A sub-element of the DRP, a BCP includes an impact analysis of the business effects of down systems. • The impact analysis helps to identify single points of failure in the business system. » A BCP helps to prioritize what systems or processes need to be brought back first to get the organization operational again. • It identifies mission critical systems, processes, and data. » A BCP helps to guide the creation of the DRP. Risk and security related concepts.
  • 7. Page 7 Risk and security related concepts.
  • 8. Page 8 – Single point of failure. » A single point of failure is a system or component that, if it goes down, has a major impact on operations (e.g., a key router that fails and prevents customers from ordering products). » Once identified, these failure points can be mitigated through several different methods such as: • Redundant systems (e.g., a backup router or redundant power supply). • System redesign (e.g., removal of the point of failure through a redesign of the system (e.g., adding an additional router). – UPS (uninterruptable power supply). » A UPS will mitigate power issues that can have a negative impact on sensitive networking components. • Conditions the incoming power to remove spikes and sags in the current, ensuring that the current flow is even. • Helps to ensure continued operation for a given period of time in the case of complete electrical power supply loss). Risk and security related concepts.
  • 9. Page 9 – First responders. » The first people to discover or respond to the security issue. • Ideally, it will be someone who has been properly trained in how to deal with the situation. » Within the network security realm, first responders can play a key role in mitigating damage and collecting evidence. – Data breach. » Any unauthorized access to data, particularly to sensitive data. • Breaches may be unintentional or intentional. • Breaches may occur internally or externally. » The severity of the breach is greatly determined by the sensitivity of the data accessed. » Data breaches can be very expensive to organizations. • Loss of reputation, which can lead to loss of revenue. • Loss of business secrets. • Fines or penalties levied by governments or other organizations. Risk and security related concepts.
  • 10. Page 10 Risk and security related concepts. User awareness and training. Greatly reducing security risks. Quite often, the weakest link in the security chain is the users. The risks can be reduced by making the users properly aware of security and security threats. Penetration testing. Finding weak spots and hardening the system. Actively and aggressively testing the whole IT system in an effort to find weak spots. This can include using social engineering methods. The data generated is used to harden the IT system to mitigate risk. Vulnerability scanning. Finding network holes and plugging them. Mostly done through the use of automated software, networks are probed for vulnerabilities (e.g., open ports or protocols). Once identified, these holes into the network can be plugged.
  • 11. Page 11 Risk and security related concepts. Organizations should establish and enforce standards and policies. These will help to mitigate any risks. DRPs are developed and used to help recover from a disaster. A BCP is a sub-element of a DRP. They identify systems and components that are mission critical to an organization and create plans to mitigate the loss of those identified elements. Topic The big picture of recovery. Summary A single point of failure is when there is a single point where a failure would create business discontinuity. Network administrators strive to remove them from their systems. A UPS is used to mitigate power issues. First responders are the people who first notice and respond to security issues. Ideally, the first responder will have been properly trained. A data breach is any unauthorized access to an organization's data. User awareness and training is used to mitigate risks associated at the user level. Penetration testing is the review of a whole system looking for weaknesses that can then be hardened. Vulnerability scanning is usually an automated process that looks for weaknesses in networks so that any holes can be plugged. Concepts and terms.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.