SlideShare una empresa de Scribd logo
1 de 20
Information Security
Shanthamallachar D B
Introduction
• InfoSec
Information security processes and policies typically involve
physical and digital security measures to protect data from
unauthorized access, use, replication or destruction.
• InfoSec Core Objectives(C-I-A Tried).
Confidential
Integrity
Availability
Main Objectives:
• LEADING THREATS
• SAFE & SECURE PRACTICES
• BEST PRACTICES
• Virus
• Worm
• Trojan Horse / Logic Bomb
• Social Engineering
• ADVANCED PERSISTENT THREAT (APT)
• Rootkits
• Botnets / Zombies
 A virus attaches itself to a program, file, or disk
 When the program is executed, the virus
activates and replicates itself
 The virus may be benign or malignant but
executes its payload at some point (often upon
contact)
 Viruses result in crashing of computers and loss
of data.
 In order to recover/prevent virus/attacks:
 Avoid potentially unreliable websites/emails
 System Restore
 Re-install operating system
 Anti-virus (i.e. Avira, AVG, Norton)
Program
A
Extra Code
Program
B
infects
• Independent program which replicates itself and sends copies from computer to
computer across network connections. Upon arrival the worm may be activated to
replicate.
To Joe
To Ann
To Bob
Email List:
Joe@gmail.com
Ann@yahoo.com
Bob@uwp.edu
• Logic Bomb: Malware logic executes upon certain conditions.
Program is often used for legitimate reasons.
▫ Software which malfunctions if maintenance fee is not paid
▫ Employee triggers a database erase when he is fired.
• Trojan Horse: Masquerades as beneficial program while
quietly destroying data or damaging your system.
▫ Download a game: Might be fun but has hidden part that emails your
password file without you knowing.
• Social engineering manipulates people into performing actions or divulging confidential information. Similar to a
confidence trick or simple fraud, the term applies to the use of deception to gain information, commit fraud, or
access computer systems.
Phone Call:
This is John,
the System
Admin. What
is your
password?
Email:
ABC Bank has
noticed a
problem with
your account…
In Person:
What ethnicity
are you? Your
mother’s
maiden name?
and have
some
software
patches
I have come
to repair
your
machine…
• Definition: An advanced persistent threat (APT) is a broad
term used to describe an attack campaign in which an
intruder, or team of intruders, establishes an illicit, long-term
presence on a network in order to mine highly sensitive data.
• Targets: Typically include Large Enterprises or Governmental
Networks
• Reason:
▫ Intellectual property theft (e.g., trade secrets or patents)
▫ Compromised sensitive information (e.g., employee and
user private data)
▫ The sabotaging of critical organizational infrastructures
(e.g., database deletion)
▫ Total site takeovers
• Phishing: a
‘trustworthy entity’
asks via e-mail for
sensitive information
such as SSN, credit
card numbers, login
IDs or passwords.
 Symptoms:
 Antivirus software detects a problem
 Pop-ups suddenly appear (may sell security software)
 Disk space disappears
 Files or transactions appear that should not be there
 System slows down to a crawl
 Unusual messages, sounds, or displays on your monitor
 Stolen laptop (1 in 10 stolen in laptop lifetime)
 Your mouse moves by itself
 Your computer shuts down and powers off by itself
 Often not recognized
• Anti-virus software detects malware and can destroy it
before any damage is done
• Install and maintain anti-virus and anti-spyware
software
• Be sure to keep anti-virus software updated
• Many free and pay options exist
• A firewall acts as a wall between your computer/private network
and the internet. Hackers may use the internet to find, use, and
install applications on your computer. A firewall prevents hacker
connections from entering your computer.
• Filters packets that enter or leave your computer
• Never use ‘admin’ or ‘root’ or ‘administrator’ as a login for the admin
• A good password is:
▫ private: it is used and known by one person only
▫ secret: it does not appear in clear text in any file or program or on a piece of paper pinned to the terminal
▫ easily remembered: so there is no need to write it down
▫ at least 8 characters, complex: a mixture of at least 3 of the following: upper case letters, lower case letters,
digits and punctuation
▫ not guessable by any program in a reasonable time, for instance less than one week.
▫ changed regularly: a good change policy is every 3 months
• Beware that someone may see you typing it. If you accidentally type your password instead of
your login name, it may appear in system log files
• Do not open email attachments unless you are expecting the email with
the attachment and you trust the sender.
• Do not click on links in emails unless you are absolutely sure of their
validity.
• Only visit and/or download software from web pages you trust.
• Definition
A clean desk policy (CDP) is a corporate directive that specifies how employees should leave
their working space when they leave the office. Most Clean Desk Policies require employees to clear
their desks of all papers at the end of the day.
• Sensitive information must be protected at all times from
anyone who may pass by including other employees, cleaners,
and office visitors
• In effect, a clean desk policy is one of the simplest ways to
protect sensitive information and to reduce the risk of a data
breach and identity theft
• A clean desk policy also complies with information security
regulations
BACKUP IMPORTANT INFORMATION
19
 No security measure is 100% reliable.
 Even the best hardware fails.
 What information is important to you?
 Is your backup:
Recent?
Off-site & Secure?
Process Documented?
Encrypted?
Tested?
• Always logoff or lock you system if you leave (even for a minute)
• Keep systems patches and up to date
• Use strong passwords and protect them
• Encrypt sensitive files
• Watch what you share
• Disable insecure mechanisms if possible
• Never let someone have access to yours system under your credentials
• Be aware of individuals looking for information or access
• Don’t forget physical security
• Report any potential breach to your InfoSec Team

Más contenido relacionado

La actualidad más candente

Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
1 security goals
1   security goals1   security goals
1 security goals
drewz lin
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
Srinu Potnuru
 

La actualidad más candente (20)

Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Computer security
Computer securityComputer security
Computer security
 
1 security goals
1   security goals1   security goals
1 security goals
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Software Security
Software SecuritySoftware Security
Software Security
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Computer security and
Computer security andComputer security and
Computer security and
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 

Similar a Information security

BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
limsh
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
EricK Gasana
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 

Similar a Information security (20)

It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Internet
InternetInternet
Internet
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Cyber security
Cyber security Cyber security
Cyber security
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
презентация1
презентация1презентация1
презентация1
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

Information security

  • 2. Introduction • InfoSec Information security processes and policies typically involve physical and digital security measures to protect data from unauthorized access, use, replication or destruction. • InfoSec Core Objectives(C-I-A Tried). Confidential Integrity Availability
  • 3.
  • 4. Main Objectives: • LEADING THREATS • SAFE & SECURE PRACTICES • BEST PRACTICES
  • 5. • Virus • Worm • Trojan Horse / Logic Bomb • Social Engineering • ADVANCED PERSISTENT THREAT (APT) • Rootkits • Botnets / Zombies
  • 6.  A virus attaches itself to a program, file, or disk  When the program is executed, the virus activates and replicates itself  The virus may be benign or malignant but executes its payload at some point (often upon contact)  Viruses result in crashing of computers and loss of data.  In order to recover/prevent virus/attacks:  Avoid potentially unreliable websites/emails  System Restore  Re-install operating system  Anti-virus (i.e. Avira, AVG, Norton) Program A Extra Code Program B infects
  • 7. • Independent program which replicates itself and sends copies from computer to computer across network connections. Upon arrival the worm may be activated to replicate. To Joe To Ann To Bob Email List: Joe@gmail.com Ann@yahoo.com Bob@uwp.edu
  • 8. • Logic Bomb: Malware logic executes upon certain conditions. Program is often used for legitimate reasons. ▫ Software which malfunctions if maintenance fee is not paid ▫ Employee triggers a database erase when he is fired. • Trojan Horse: Masquerades as beneficial program while quietly destroying data or damaging your system. ▫ Download a game: Might be fun but has hidden part that emails your password file without you knowing.
  • 9. • Social engineering manipulates people into performing actions or divulging confidential information. Similar to a confidence trick or simple fraud, the term applies to the use of deception to gain information, commit fraud, or access computer systems. Phone Call: This is John, the System Admin. What is your password? Email: ABC Bank has noticed a problem with your account… In Person: What ethnicity are you? Your mother’s maiden name? and have some software patches I have come to repair your machine…
  • 10. • Definition: An advanced persistent threat (APT) is a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, long-term presence on a network in order to mine highly sensitive data. • Targets: Typically include Large Enterprises or Governmental Networks • Reason: ▫ Intellectual property theft (e.g., trade secrets or patents) ▫ Compromised sensitive information (e.g., employee and user private data) ▫ The sabotaging of critical organizational infrastructures (e.g., database deletion) ▫ Total site takeovers
  • 11. • Phishing: a ‘trustworthy entity’ asks via e-mail for sensitive information such as SSN, credit card numbers, login IDs or passwords.
  • 12.  Symptoms:  Antivirus software detects a problem  Pop-ups suddenly appear (may sell security software)  Disk space disappears  Files or transactions appear that should not be there  System slows down to a crawl  Unusual messages, sounds, or displays on your monitor  Stolen laptop (1 in 10 stolen in laptop lifetime)  Your mouse moves by itself  Your computer shuts down and powers off by itself  Often not recognized
  • 13.
  • 14. • Anti-virus software detects malware and can destroy it before any damage is done • Install and maintain anti-virus and anti-spyware software • Be sure to keep anti-virus software updated • Many free and pay options exist
  • 15. • A firewall acts as a wall between your computer/private network and the internet. Hackers may use the internet to find, use, and install applications on your computer. A firewall prevents hacker connections from entering your computer. • Filters packets that enter or leave your computer
  • 16. • Never use ‘admin’ or ‘root’ or ‘administrator’ as a login for the admin • A good password is: ▫ private: it is used and known by one person only ▫ secret: it does not appear in clear text in any file or program or on a piece of paper pinned to the terminal ▫ easily remembered: so there is no need to write it down ▫ at least 8 characters, complex: a mixture of at least 3 of the following: upper case letters, lower case letters, digits and punctuation ▫ not guessable by any program in a reasonable time, for instance less than one week. ▫ changed regularly: a good change policy is every 3 months • Beware that someone may see you typing it. If you accidentally type your password instead of your login name, it may appear in system log files
  • 17. • Do not open email attachments unless you are expecting the email with the attachment and you trust the sender. • Do not click on links in emails unless you are absolutely sure of their validity. • Only visit and/or download software from web pages you trust.
  • 18. • Definition A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office. Most Clean Desk Policies require employees to clear their desks of all papers at the end of the day. • Sensitive information must be protected at all times from anyone who may pass by including other employees, cleaners, and office visitors • In effect, a clean desk policy is one of the simplest ways to protect sensitive information and to reduce the risk of a data breach and identity theft • A clean desk policy also complies with information security regulations
  • 19. BACKUP IMPORTANT INFORMATION 19  No security measure is 100% reliable.  Even the best hardware fails.  What information is important to you?  Is your backup: Recent? Off-site & Secure? Process Documented? Encrypted? Tested?
  • 20. • Always logoff or lock you system if you leave (even for a minute) • Keep systems patches and up to date • Use strong passwords and protect them • Encrypt sensitive files • Watch what you share • Disable insecure mechanisms if possible • Never let someone have access to yours system under your credentials • Be aware of individuals looking for information or access • Don’t forget physical security • Report any potential breach to your InfoSec Team