Download - Security & Privacy of Information Technology
![Page 1: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/1.jpg)
SECURITY & PRIVACYFOR
DEVICES & TECHNOLOGY..!
![Page 2: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/2.jpg)
Group Members :
Sebina Sebastian (P-40)
Ashish Mathew (P-07)
Tushar Pahurkar (P-48)
Samiksha Thanekar (P-37)
Ishan Mahadik (P-11)
![Page 3: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/3.jpg)
What is Security? Is the protection of assets. The three main
aspects are: • Prevention
• Detection
• Re-action
![Page 4: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/4.jpg)
Computer Security:
It deals with the prevention and detection of unauthorised actions by users of a computer system.
![Page 5: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/5.jpg)
It is more than just protecting hardware and software from being crashed
It’s about protecting the information resources that keep the company operating
Goals are to ensure: Data integrity, availability and
confidentiality Business continuity
Information Security
![Page 6: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/6.jpg)
Risk
![Page 7: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/7.jpg)
Risks and Threats
Fraudo Computer manipulationo Damage or modification of computer data
Service interruptions and delaysIntrusions
Information manipulation
![Page 8: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/8.jpg)
Risks and Threats
Denial of service attackso Flood attacko Ping attacko SYN attacko Teardrop attacko Smurf attack
Error
Information theft
![Page 9: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/9.jpg)
Risks and Threats
• Malicious softwareo Trojan horseo Wormso Boot sector virus
• Web site defacements
![Page 10: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/10.jpg)
Extortion
Sniffing
Risks and Threats
![Page 11: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/11.jpg)
Spoofing
Risks and Threats
![Page 12: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/12.jpg)
Con artists
Phishing or Fishing
Risks and Threats
![Page 13: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/13.jpg)
COMPUTER CRIMINALSHacker
Script kiddies
Cyber-criminals
Organized crime
![Page 14: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/14.jpg)
Terrorists
Insiders
COMPUTER CRIMINALS
![Page 15: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/15.jpg)
COUNTERMEASURES
CIA triad
![Page 16: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/16.jpg)
Internal Controls Physical
Technical
Administrative
![Page 17: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/17.jpg)
Firewalls:
Technical Countermeasures
![Page 18: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/18.jpg)
Encryption/decryption
![Page 19: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/19.jpg)
• Virtual Private Networks (VPNs)
![Page 20: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/20.jpg)
• Backup
![Page 21: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/21.jpg)
Authentication`
Identification
Privacy
IntegrityNon-repudiation
Security’s Five Pillars
![Page 22: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/22.jpg)
Authentication
Identification
Privacy
![Page 23: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/23.jpg)
Integrity
Non-repudiation
![Page 24: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/24.jpg)
Conclusion
![Page 25: Security & Privacy of Information Technology](https://reader036.vdocuments.net/reader036/viewer/2022081413/54683907af795985308b5863/html5/thumbnails/25.jpg)
THANK YOU !