SlideShare una empresa de Scribd logo
1 de 17
INTRODUCTION TO INFORMATION  SYSTEMS SUPdeCO - PCM - English Track October 2008 Computer-Based Information Systems  Security PROF. DIANA MANGALAGIU MANAGEMENT AND STRATEGY DEPARTMENT
Concept of security «  The security of an information system is its non-vulnerability to accidents or deliberate attacks, that is the impossibility that those attacks have any serious impacts on the state and the operation of the system »  J. P. Magnier
Why security is a hot topic ,[object Object],[object Object],[object Object],[object Object]
General   definitions Un sinistre Causes of vulnerability Immediate and long-term effects An attack or a natural disaster Disaster : Source: P. Reix
S ecurity guidelines : To handle security, it should be assessed using indicators including: 1 – Availability  of information and functionalities 2 – Truthfulness  of information 3 –  Confidentiality  of information 4 –  Non-repudiation  of communications 5 –  Traceability  of operations Potential causes of the disaster   make it essential to keep watch over the vulnerability of the system and thus over the  risks  it runs. General   definitions
Causes of disasters ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security  planning Policies for security 1 – Material resource security 2 – Software security 3 – Application security 4 – General security steps 5 – Insurance The idea that security is entirely handled by hardware and software related procedures is a dangerous utopia as it must come with organizational thinking as well as awareness and training of individuals.
Four cornerstones of security & trust authentication integrity & non- authorisation confidentiality repudiation
Authentication ,[object Object],authentication
Integrity ,[object Object],authentication integrity
Non-repudiation ,[object Object],authentication integrity & non- repudiation
Confidentiality Only intended recipient can make sense of message or stored information authentication integrity & non- confidentiality repudiation
Authorisation Is the user allowed to perform these operations? authentication integrity & non- authorisation confidentiality repudiation
Security tradeoffs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Common web scenarios and their security aspects  Scenario 1: online banking ,[object Object],[object Object],[object Object],[object Object]
Scenario 2: Downloading code ,[object Object],[object Object],[object Object]
Scenario 3: online credit card transactions ,[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacksSugirtha Jasmine M
 
Cyber security
Cyber securityCyber security
Cyber securityEduonix
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015T. J. Saotome
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introductionAfna Crcs
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthIceQUICK
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Seqrite
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysisdadkhah077
 
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Ronan Martin
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attackisc2-hellenic
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Edureka!
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 

La actualidad más candente (20)

E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information security
Information securityInformation security
Information security
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
 
презентация1
презентация1презентация1
презентация1
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 

Destacado

Presentacion house
Presentacion housePresentacion house
Presentacion housePakitalero
 
Revolução Digital Pós NRF 2016
Revolução Digital Pós NRF 2016Revolução Digital Pós NRF 2016
Revolução Digital Pós NRF 2016Ricardo Kubo
 
Visiting Places
Visiting PlacesVisiting Places
Visiting Placestsisves
 
110118 Presentasion Proposal Thesis Print
110118 Presentasion Proposal Thesis Print110118 Presentasion Proposal Thesis Print
110118 Presentasion Proposal Thesis PrintReggy Lu
 
Social Media Recruiting Israel 2011
Social Media Recruiting Israel 2011 Social Media Recruiting Israel 2011
Social Media Recruiting Israel 2011 iTalent
 
מציאות ברשת
מציאות ברשתמציאות ברשת
מציאות ברשתiTalent
 
Intranets2012: Aligning your intranet to your business
Intranets2012: Aligning your intranet to your businessIntranets2012: Aligning your intranet to your business
Intranets2012: Aligning your intranet to your businessDeloitte Australia
 
Intelligens ház
Intelligens házIntelligens ház
Intelligens házkleila83
 
dddddddddddddddd
dddddddddddddddddddddddddddddddd
ddddddddddddddddsbavaro
 
Citadel Career Center - Leading the way
Citadel Career Center - Leading the wayCitadel Career Center - Leading the way
Citadel Career Center - Leading the wayPage Tisdale
 
A New Entrepreneurship - A Backwards Approach
A New Entrepreneurship - A Backwards ApproachA New Entrepreneurship - A Backwards Approach
A New Entrepreneurship - A Backwards ApproachLoopshot
 

Destacado (20)

Hula hoops
Hula hoopsHula hoops
Hula hoops
 
Presentacion house
Presentacion housePresentacion house
Presentacion house
 
Revolução Digital Pós NRF 2016
Revolução Digital Pós NRF 2016Revolução Digital Pós NRF 2016
Revolução Digital Pós NRF 2016
 
9.1º Notas
9.1º  Notas9.1º  Notas
9.1º Notas
 
Intranet homepage competition
Intranet homepage competitionIntranet homepage competition
Intranet homepage competition
 
Visiting Places
Visiting PlacesVisiting Places
Visiting Places
 
Marketology Social Media Masterclass presentation
Marketology Social Media Masterclass presentationMarketology Social Media Masterclass presentation
Marketology Social Media Masterclass presentation
 
110118 Presentasion Proposal Thesis Print
110118 Presentasion Proposal Thesis Print110118 Presentasion Proposal Thesis Print
110118 Presentasion Proposal Thesis Print
 
Social Media Recruiting Israel 2011
Social Media Recruiting Israel 2011 Social Media Recruiting Israel 2011
Social Media Recruiting Israel 2011
 
מציאות ברשת
מציאות ברשתמציאות ברשת
מציאות ברשת
 
Wo ist Pluto?
Wo ist Pluto?Wo ist Pluto?
Wo ist Pluto?
 
Mie presentation
Mie presentationMie presentation
Mie presentation
 
2136
21362136
2136
 
Intranets2012: Aligning your intranet to your business
Intranets2012: Aligning your intranet to your businessIntranets2012: Aligning your intranet to your business
Intranets2012: Aligning your intranet to your business
 
Francia 2013
Francia 2013Francia 2013
Francia 2013
 
Intelligens ház
Intelligens házIntelligens ház
Intelligens ház
 
dddddddddddddddd
dddddddddddddddddddddddddddddddd
dddddddddddddddd
 
Citadel Career Center - Leading the way
Citadel Career Center - Leading the wayCitadel Career Center - Leading the way
Citadel Career Center - Leading the way
 
Uranium!!!!
Uranium!!!!Uranium!!!!
Uranium!!!!
 
A New Entrepreneurship - A Backwards Approach
A New Entrepreneurship - A Backwards ApproachA New Entrepreneurship - A Backwards Approach
A New Entrepreneurship - A Backwards Approach
 

Similar a Class4 Security

Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskBeyondTrust
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systemsmsd11
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationShritam Bhowmick
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer SecurityKamal Acharya
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
RaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxRaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxaudeleypearl
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 

Similar a Class4 Security (20)

Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
 
information security management
information security managementinformation security management
information security management
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
 
introduction of ethical hacking. ppt
introduction of ethical hacking. pptintroduction of ethical hacking. ppt
introduction of ethical hacking. ppt
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
 
Module 4.pdf
Module 4.pdfModule 4.pdf
Module 4.pdf
 
Module 4 Cyber Security Vulnerabilities& Safe Guards
Module 4 Cyber Security Vulnerabilities& Safe GuardsModule 4 Cyber Security Vulnerabilities& Safe Guards
Module 4 Cyber Security Vulnerabilities& Safe Guards
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
RaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxRaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 

Más de RMS

2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management2008 Rms Cross Cultural Management
2008 Rms Cross Cultural ManagementRMS
 
2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management2008 Rms Cross Cultural Management
2008 Rms Cross Cultural ManagementRMS
 
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans PhotosAmphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans PhotosRMS
 
Life Track
Life TrackLife Track
Life TrackRMS
 
Personality Pcm
Personality PcmPersonality Pcm
Personality PcmRMS
 
Ob
ObOb
ObRMS
 
Perception Pcm P1
Perception Pcm P1Perception Pcm P1
Perception Pcm P1RMS
 
Intro I Mba Pcm
Intro I Mba PcmIntro I Mba Pcm
Intro I Mba PcmRMS
 
The Jim Davis Case
The Jim Davis CaseThe Jim Davis Case
The Jim Davis CaseRMS
 
Perception Pcm P2
Perception Pcm  P2Perception Pcm  P2
Perception Pcm P2RMS
 
Foundations Of Leadership Pcm
Foundations Of  Leadership PcmFoundations Of  Leadership Pcm
Foundations Of Leadership PcmRMS
 
Class3 Edi Ppt
Class3 Edi PptClass3 Edi Ppt
Class3 Edi PptRMS
 
Class2 Business Software
Class2 Business SoftwareClass2 Business Software
Class2 Business SoftwareRMS
 
Class1 Intro Is
Class1 Intro IsClass1 Intro Is
Class1 Intro IsRMS
 
Pcm Mngt Acctg Budgetary Control
Pcm   Mngt Acctg   Budgetary ControlPcm   Mngt Acctg   Budgetary Control
Pcm Mngt Acctg Budgetary ControlRMS
 
Pcm Mngt Acctg Conclusion
Pcm   Mngt Acctg ConclusionPcm   Mngt Acctg Conclusion
Pcm Mngt Acctg ConclusionRMS
 
04 Marketing Concurrence
04 Marketing Concurrence04 Marketing Concurrence
04 Marketing ConcurrenceRMS
 
05 Marketing Diagnostic Interne ChaîNe Valeur
05 Marketing Diagnostic Interne ChaîNe Valeur05 Marketing Diagnostic Interne ChaîNe Valeur
05 Marketing Diagnostic Interne ChaîNe ValeurRMS
 
06 StratéGies GéNéRiques
06 StratéGies GéNéRiques06 StratéGies GéNéRiques
06 StratéGies GéNéRiquesRMS
 
03 Marketing Marché
03 Marketing Marché03 Marketing Marché
03 Marketing MarchéRMS
 

Más de RMS (20)

2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management
 
2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management2008 Rms Cross Cultural Management
2008 Rms Cross Cultural Management
 
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans PhotosAmphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
 
Life Track
Life TrackLife Track
Life Track
 
Personality Pcm
Personality PcmPersonality Pcm
Personality Pcm
 
Ob
ObOb
Ob
 
Perception Pcm P1
Perception Pcm P1Perception Pcm P1
Perception Pcm P1
 
Intro I Mba Pcm
Intro I Mba PcmIntro I Mba Pcm
Intro I Mba Pcm
 
The Jim Davis Case
The Jim Davis CaseThe Jim Davis Case
The Jim Davis Case
 
Perception Pcm P2
Perception Pcm  P2Perception Pcm  P2
Perception Pcm P2
 
Foundations Of Leadership Pcm
Foundations Of  Leadership PcmFoundations Of  Leadership Pcm
Foundations Of Leadership Pcm
 
Class3 Edi Ppt
Class3 Edi PptClass3 Edi Ppt
Class3 Edi Ppt
 
Class2 Business Software
Class2 Business SoftwareClass2 Business Software
Class2 Business Software
 
Class1 Intro Is
Class1 Intro IsClass1 Intro Is
Class1 Intro Is
 
Pcm Mngt Acctg Budgetary Control
Pcm   Mngt Acctg   Budgetary ControlPcm   Mngt Acctg   Budgetary Control
Pcm Mngt Acctg Budgetary Control
 
Pcm Mngt Acctg Conclusion
Pcm   Mngt Acctg ConclusionPcm   Mngt Acctg Conclusion
Pcm Mngt Acctg Conclusion
 
04 Marketing Concurrence
04 Marketing Concurrence04 Marketing Concurrence
04 Marketing Concurrence
 
05 Marketing Diagnostic Interne ChaîNe Valeur
05 Marketing Diagnostic Interne ChaîNe Valeur05 Marketing Diagnostic Interne ChaîNe Valeur
05 Marketing Diagnostic Interne ChaîNe Valeur
 
06 StratéGies GéNéRiques
06 StratéGies GéNéRiques06 StratéGies GéNéRiques
06 StratéGies GéNéRiques
 
03 Marketing Marché
03 Marketing Marché03 Marketing Marché
03 Marketing Marché
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Class4 Security

  • 1. INTRODUCTION TO INFORMATION SYSTEMS SUPdeCO - PCM - English Track October 2008 Computer-Based Information Systems Security PROF. DIANA MANGALAGIU MANAGEMENT AND STRATEGY DEPARTMENT
  • 2. Concept of security «  The security of an information system is its non-vulnerability to accidents or deliberate attacks, that is the impossibility that those attacks have any serious impacts on the state and the operation of the system » J. P. Magnier
  • 3.
  • 4. General definitions Un sinistre Causes of vulnerability Immediate and long-term effects An attack or a natural disaster Disaster : Source: P. Reix
  • 5. S ecurity guidelines : To handle security, it should be assessed using indicators including: 1 – Availability of information and functionalities 2 – Truthfulness of information 3 – Confidentiality of information 4 – Non-repudiation of communications 5 – Traceability of operations Potential causes of the disaster make it essential to keep watch over the vulnerability of the system and thus over the risks it runs. General definitions
  • 6.
  • 7. Security planning Policies for security 1 – Material resource security 2 – Software security 3 – Application security 4 – General security steps 5 – Insurance The idea that security is entirely handled by hardware and software related procedures is a dangerous utopia as it must come with organizational thinking as well as awareness and training of individuals.
  • 8. Four cornerstones of security & trust authentication integrity & non- authorisation confidentiality repudiation
  • 9.
  • 10.
  • 11.
  • 12. Confidentiality Only intended recipient can make sense of message or stored information authentication integrity & non- confidentiality repudiation
  • 13. Authorisation Is the user allowed to perform these operations? authentication integrity & non- authorisation confidentiality repudiation
  • 14.
  • 15.
  • 16.
  • 17.

Notas del editor

  1. Bouygues Télécom : Sa panne informatique du 17/11/2004 lui coûte 16 millions d’Euros SNCF : 1000 terminaux paralysés en juillet 2004 Selon Microsoft , 2,4 milliards d’heures de travail dans les entreprises ce qui équivaut en France à 20€ de l’heure X 15 millions de personnes = 1,8 milliards d’euros de perte