SlideShare a Scribd company logo
Security & Privacy of Information Technology
Group Members :
 Sebina Sebastian (P-40)
 Ashish Mathew (P-07)
 Tushar Pahurkar (P-48)
 Samiksha Thanekar (P-37)
 Ishan Mahadik (P-11)
What is Security?
Is the protection of assets. The three main aspects are:
•

Prevention

•

Detection

•

Re-action
Computer Security:
It deals with the prevention and detection of
unauthorised actions by users of a computer
system.
Information Security
 It is more than just protecting hardware and

software from being crashed
 It’s about protecting the information
resources that keep the company operating
 Goals are to ensure:
 Data integrity, availability and
confidentiality
 Business continuity
Risk
Risks and Threats
 Fraud
o Computer manipulation
o Damage or modification of computer data
 Service interruptions and

delays
 Intrusions
 Information manipulation
Risks and Threats
 Denial of service attacks

o Flood attack
o Ping attack
o SYN attack
o Teardrop attack

o Smurf attack
 Error

 Information theft
Risks and Threats
• Malicious software
o Trojan horse
o Worms

o Boot sector virus
• Web site defacements
Risks and Threats
 Extortion

 Sniffing
Risks and Threats
 Spoofing
Risks and Threats
 Con artists
 Phishing or Fishing
COMPUTER CRIMINALS
 Hacker
 Script kiddies
 Cyber-criminals
 Organized crime
COMPUTER CRIMINALS
 Terrorists

 Insiders
CIA triad
 Internal Controls
 Physical


Technical



Administrative
Technical Countermeasures
 Firewalls:
 Encryption/decryption
•

Virtual Private Networks (VPNs)
• Backup
Security’s Five Pillars

Non-repudiation

Integrity

Privacy

Identification

Authentication`
 Authentication
 Identification

 Privacy
 Integrity
 Non-repudiation
Conclusion
Security & Privacy of Information Technology

More Related Content

PPTX
Information Security and Privacy
PPTX
Data Privacy Introduction
PPTX
InformationSecurity
PPT
Information security management
PPTX
Introduction to Information Security
PDF
Information Security Risk Management
PPTX
Information Privacy
PPT
Security policy
Information Security and Privacy
Data Privacy Introduction
InformationSecurity
Information security management
Introduction to Information Security
Information Security Risk Management
Information Privacy
Security policy

What's hot (20)

PDF
Network Security Presentation
PPTX
Information security
PDF
Computer Security Threats
PPTX
Information Security Lecture #1 ppt
PPT
Information System Security(lecture 1)
PPTX
INFORMATION SECURITY
PPTX
PPT
chapter 1. Introduction to Information Security
PPTX
Cyber security & awareness
PPTX
Information Security vs IT - Key Roles & Responsibilities
PDF
Privacy and Data Security
PPTX
Introduction to Network Security
PPTX
Security Awareness Training.pptx
PPTX
Privacy , Security and Ethics Presentation
PDF
Overview of Information Security & Privacy
PPTX
Data security
PPTX
Security risk management
PPS
Introduction to Data Protection and Information Security
PPTX
Cybersecurity Awareness Training
PPT
Information security and Attacks
Network Security Presentation
Information security
Computer Security Threats
Information Security Lecture #1 ppt
Information System Security(lecture 1)
INFORMATION SECURITY
chapter 1. Introduction to Information Security
Cyber security & awareness
Information Security vs IT - Key Roles & Responsibilities
Privacy and Data Security
Introduction to Network Security
Security Awareness Training.pptx
Privacy , Security and Ethics Presentation
Overview of Information Security & Privacy
Data security
Security risk management
Introduction to Data Protection and Information Security
Cybersecurity Awareness Training
Information security and Attacks
Ad

Similar to Security & Privacy of Information Technology (20)

PPT
Security Properties
PPTX
Cybersecurity and Ethical Hacking Classes Chandigarh
PPTX
PPTX
PPT
Challenges in implementating cyber security
PDF
IS&C-Lecture-1.pdffgf fdgdgdfgdg fdgdg gdgg
PPTX
Cyber-Security2.pptx
PPTX
Cyber-Security1.pptx
PPTX
EBRE TABOR UNIVERSITY Gafat Institute of Technology Department of Information...
PPTX
Hacking and its types
PPT
Chapter 1 overview
PPT
Security - Chapter 1.ppt
PPTX
IT Security.pptx..................................
PPT
Overview
PDF
Module one of CND presenation information.pdf
PDF
Health Information Security and Privacy (June 19, 2017)
PPT
Cyber Crime and Security Ch 1 .ppt
PPTX
Hacking & its types
PPTX
Data Information and Security Unit-1.pptx
PPTX
cryptography Threat - Attack presentation.pptx
Security Properties
Cybersecurity and Ethical Hacking Classes Chandigarh
Challenges in implementating cyber security
IS&C-Lecture-1.pdffgf fdgdgdfgdg fdgdg gdgg
Cyber-Security2.pptx
Cyber-Security1.pptx
EBRE TABOR UNIVERSITY Gafat Institute of Technology Department of Information...
Hacking and its types
Chapter 1 overview
Security - Chapter 1.ppt
IT Security.pptx..................................
Overview
Module one of CND presenation information.pdf
Health Information Security and Privacy (June 19, 2017)
Cyber Crime and Security Ch 1 .ppt
Hacking & its types
Data Information and Security Unit-1.pptx
cryptography Threat - Attack presentation.pptx
Ad

More from Ashish Mathew (8)

PPT
Baskin & Robbins case study
PPTX
Comparative analysis on HUL, ITC and P&G
PPTX
Selling Articles from Harvard Business Review
PPTX
P07. Red Bull Marketing Strategy
PPTX
War of Browsers
PPTX
War of deodorants
PPTX
Phil knight Case Study
PPT
Talent crunch in indian it companies
Baskin & Robbins case study
Comparative analysis on HUL, ITC and P&G
Selling Articles from Harvard Business Review
P07. Red Bull Marketing Strategy
War of Browsers
War of deodorants
Phil knight Case Study
Talent crunch in indian it companies

Recently uploaded (20)

PDF
Basic Mud Logging Guide for educational purpose
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Institutional Correction lecture only . . .
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Basic Mud Logging Guide for educational purpose
Microbial disease of the cardiovascular and lymphatic systems
VCE English Exam - Section C Student Revision Booklet
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Insiders guide to clinical Medicine.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Institutional Correction lecture only . . .
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
STATICS OF THE RIGID BODIES Hibbelers.pdf
Pharma ospi slides which help in ospi learning
Final Presentation General Medicine 03-08-2024.pptx
Anesthesia in Laparoscopic Surgery in India
O7-L3 Supply Chain Operations - ICLT Program
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape

Security & Privacy of Information Technology