2
Most read
4
Most read
5
Most read
It Security
AttacksViruses, Worms, TrojansSpam, Adware, Malware, PhishingHacking is the intentional use of a computer resource without authorization or in excess of authorization.Denial-of-service (DoS) attacks overload victim servers so that they cannot serve users.
AttackersTraditional hackers were curiosity driven.Today’s hackers are criminals that dominate the attack world.On the horizon, cyberterror attacks by terrorist and cyberwar attacks by foreign governments could cause unprecedented levels of damage.
Security ManagementSecurity is primarily a management issue, not a technical issue.Risk Analysis – balancing cost and benefits of protectionComprehensive Security – Closing all avenues of attacks
Access ControlIdentify and list each assetRate the sensitivity of each asset in terms of security riskAccess Control Plan.  Also called Triple AAA.  Authentication, Authorization, and Auditing
Firewalls, IDSs, and IPSsFirewalls examine packets passing through the firewall.Intrusion Detection Systems (IDS) are designed to detect suspicious traffic.Intrusion Prevention Systems (IPS) are used to recognize complex attacks.  It helps prevent false positives.
Host Hardening and Vulnerability TestingServers can be hardened by having vulnerabilities patchedVulnerability Test should be conducted by attacking the network (with permission) , in order to identify security weaknesses.http://www.youtube.com/watch?v=MJNJjh4jORY

More Related Content

PPTX
Cyber security presentation
PPTX
Cyber security
PPTX
Cyber security presentation
PPTX
Cybersecurity PowerPoint Presentation
PPTX
Cyber security
PPTX
Introduction to Social Networking
PPTX
Cybercrime.ppt
PPTX
East india company
Cyber security presentation
Cyber security
Cyber security presentation
Cybersecurity PowerPoint Presentation
Cyber security
Introduction to Social Networking
Cybercrime.ppt
East india company

What's hot (20)

PPTX
Cyber security
PPTX
Denial of service
PPTX
Web application attacks
PPTX
Cyber attack
PPTX
Denial of Service Attack
PDF
Cyber security
PPT
DDOS Attack
PPTX
Basics of Denial of Service Attacks
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Dos attack
PPTX
Spyware presentation by mangesh wadibhasme
PPTX
Types of attacks
PPTX
Network attacks
PDF
Social engineering attacks
PPTX
MALWARE
PPTX
Introduction to cyber security amos
PPT
Information security in todays world
PPTX
CYBER SECURITY
PPTX
Cybercrime and Security
PPTX
Cyber security
Cyber security
Denial of service
Web application attacks
Cyber attack
Denial of Service Attack
Cyber security
DDOS Attack
Basics of Denial of Service Attacks
Network security (vulnerabilities, threats, and attacks)
Dos attack
Spyware presentation by mangesh wadibhasme
Types of attacks
Network attacks
Social engineering attacks
MALWARE
Introduction to cyber security amos
Information security in todays world
CYBER SECURITY
Cybercrime and Security
Cyber security
Ad

Similar to IT Security Presentation (20)

PPT
Essentials Of Security
 
PPTX
vanmathy cryptography network security
PPTX
vanmathy cryptography network security
PDF
Implications of Misuse and Cyber Security.pdf
PDF
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
PDF
IT Security.pdf
PPTX
Basics of System Security and Tools
PPTX
Navigating -the -Cyber-Threat -Landscape
PPTX
Information-security and best pracrices tools for the enhanced security of s...
PPTX
Cyber security
PPT
Ne Course Part Two
PDF
Cybersecurity Dictionary: Your Quick Guide to Essential Terms-Ebook.pdf
PDF
Chapter 2 konsep dasar keamanan
PPTX
System Security- Firewalls and ID System
PDF
The Role of Intrusion Detection Systems in Network Security.pdf
PDF
The Role of Intrusion Detection Systems in Network Security.pdf
DOCX
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill Educat
PPTX
Assess risks to IT security.pptx
PDF
Identity Threat Detection and Response- The Next Big Thing in Cybersecurity.pdf
PDF
Enhanced method for intrusion detection over kdd cup 99 dataset
Essentials Of Security
 
vanmathy cryptography network security
vanmathy cryptography network security
Implications of Misuse and Cyber Security.pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
IT Security.pdf
Basics of System Security and Tools
Navigating -the -Cyber-Threat -Landscape
Information-security and best pracrices tools for the enhanced security of s...
Cyber security
Ne Course Part Two
Cybersecurity Dictionary: Your Quick Guide to Essential Terms-Ebook.pdf
Chapter 2 konsep dasar keamanan
System Security- Firewalls and ID System
The Role of Intrusion Detection Systems in Network Security.pdf
The Role of Intrusion Detection Systems in Network Security.pdf
Chapter 2Risk AnalysisCopyright © 2014 by McGraw-Hill Educat
Assess risks to IT security.pptx
Identity Threat Detection and Response- The Next Big Thing in Cybersecurity.pdf
Enhanced method for intrusion detection over kdd cup 99 dataset
Ad

IT Security Presentation

  • 2. AttacksViruses, Worms, TrojansSpam, Adware, Malware, PhishingHacking is the intentional use of a computer resource without authorization or in excess of authorization.Denial-of-service (DoS) attacks overload victim servers so that they cannot serve users.
  • 3. AttackersTraditional hackers were curiosity driven.Today’s hackers are criminals that dominate the attack world.On the horizon, cyberterror attacks by terrorist and cyberwar attacks by foreign governments could cause unprecedented levels of damage.
  • 4. Security ManagementSecurity is primarily a management issue, not a technical issue.Risk Analysis – balancing cost and benefits of protectionComprehensive Security – Closing all avenues of attacks
  • 5. Access ControlIdentify and list each assetRate the sensitivity of each asset in terms of security riskAccess Control Plan. Also called Triple AAA. Authentication, Authorization, and Auditing
  • 6. Firewalls, IDSs, and IPSsFirewalls examine packets passing through the firewall.Intrusion Detection Systems (IDS) are designed to detect suspicious traffic.Intrusion Prevention Systems (IPS) are used to recognize complex attacks. It helps prevent false positives.
  • 7. Host Hardening and Vulnerability TestingServers can be hardened by having vulnerabilities patchedVulnerability Test should be conducted by attacking the network (with permission) , in order to identify security weaknesses.http://www.youtube.com/watch?v=MJNJjh4jORY