Mis presentation by suraj vaidya

24
INFORMATION SECURITY Submitted to Prof. Sandeep Ponde By Suraj Shweta Shreesha Khusboo Pooja Pradeep

description

 

Transcript of Mis presentation by suraj vaidya

Page 1: Mis presentation by suraj vaidya

INFORMATION SECURITYSubmitted to Prof. Sandeep PondeBy Suraj ShwetaShreesha KhusbooPoojaPradeep

Page 2: Mis presentation by suraj vaidya

Contents

Information Security

-Concept

Principles of Information Security

-Confidentiality

-Integrity

-Availability

Types of threats

Types of Risks

Page 3: Mis presentation by suraj vaidya

Information Security

Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.

Page 4: Mis presentation by suraj vaidya

Need of Information Security

Why

For Managing Information System performance and security

How

Controls

Page 5: Mis presentation by suraj vaidya

Information Security Attributes

Page 6: Mis presentation by suraj vaidya

Principles of Information security

Principles

Confidentiality Integrity Availability

Preventing Disclosure of Information to Unauthorized Users

To ensure that information will not change when transmitted

Data is accessible to Authorized Users when they need it

Page 7: Mis presentation by suraj vaidya

Controls

Control is a constraint applied to a system to ensure proper use and security standards.

To minimise errors, fraud and destruction

Categories

Controls

CommonInformation

System Procedural Facility

Page 8: Mis presentation by suraj vaidya

Common controls

• Free from bugs

• Handle unforeseen situations

Robustness

• To protect against loss of data caused by- natural disasters, computer virus or human errors

Back up

• Access to Authorised users

Access control

Page 9: Mis presentation by suraj vaidya

Common controls

• A single entry is recorded in different files for different purposes

Atomic transactions

• Documenting facts like who, what, which transactions by whose Approval

Audit trial

Page 10: Mis presentation by suraj vaidya

Information System Controls

Input

Controls:

• Encryption

• Data Entry Screens

• Error Signals

• Control totals

Processing

Controls

• Software

• Hardware

• Firewalls

• Check Points

Output

Controls

• Encryption

• Control totals

• Control Listings

• End user feedback

Storage

Controls:EncryptionLibrary ProceduresDatabase administration

Page 11: Mis presentation by suraj vaidya

Processing Controls

Processing

Controls

Hardware Controls Software Controls

Special Checks built into hardware to verify the accuracy of computer processing

Ensure that the right Data are being processed

Page 12: Mis presentation by suraj vaidya

Hardware Controls

•Malfunction Detection Circuit

•Redundant Components

•(multiple read write heads on magnetic tape and disk)

•Special Purpose microprocessors and associated circuitry

•To support remote and diagnostic maintenance

Page 13: Mis presentation by suraj vaidya

Software Controls

E.g. The operating system or other software checks the internal file labels at the beginning and end of magnetic disk and tape files.

Establishments of checkpoints during the processing of a program

Page 14: Mis presentation by suraj vaidya

Storage Controls

Files of Computer Program,

organizational database

Data centre specialists, database

administrators

For maintenance and controlling access to the program libraries and databases of the organization

Page 15: Mis presentation by suraj vaidya

Storage Controls

Database & File Protection

Unauthorised or accidental use by

security programgs

Account codes, passwords and other security codes

Used to allow access to authorised users only with the help of digital Catalog

Operation systems or security monitors protect the databases of real-time processing systems

Page 16: Mis presentation by suraj vaidya

Facility Controls

Facility controls are methods that protect an organizations computing and network facilities and their contents from loss or destruction.

Facility Controls

Network Security

Physical Protection

Biometric Controls

Computer failure

Page 17: Mis presentation by suraj vaidya

Facility Controls

Network Security

Security may be provided by specialised system software packages ‘System Security

Monitors’

Page 18: Mis presentation by suraj vaidya

Facility Controls

Physical Protection Controls

Includes

Door locks

Burglar alarms

Closed circuit TV,

Fire detectors and extinguishers

Dust controls

Page 19: Mis presentation by suraj vaidya

Facility Controls

Biometric Controls

It is an automated method of verifying the identify of a person, based on physiological or behavioural characteristics.

E.g., Photo of face, Fingerprints etc.

Page 20: Mis presentation by suraj vaidya

Facility Controls

Computer Failure Controls

The information services department takes steps to prevent computer failure.

Computer with maintenance capability are brought in. Hardware and software changes are carefully made

Page 21: Mis presentation by suraj vaidya

Threats to Information security

Threats

Human Errors Environmental Hazards Computer Crimes

E.g. Design of H/W & of Information Sys.

E.g. Earthquakes,Floods,TornadoSmoke, heat ETC.

Computer Abuse- Crime in which computer is based as tool.

Page 22: Mis presentation by suraj vaidya

Risks to Information security

Risks

Hardware Application & Data Online Operations

Page 23: Mis presentation by suraj vaidya

Conclusion

“It used to be expensive to make things publicand cheap to make them private. Now it’sexpensive to make things private and cheapto make them public.” — Clay Shirky, Internetscholar and professor at N.Y.U.

Page 24: Mis presentation by suraj vaidya

DA

NK

ET

ha

nk

Yo

u