尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Presented To: Dedicated To:
Arfa Abdul Karim Randhawa
was a Pakistani student and
computer prodigy, who in
2004 at the age of nine years
became Microsoft Certified
Professional, the youngest in
the world
Honourable And Respectable
Mr. Ahmer Umer
What Is Information
Security…?
 Computer security is information security as
applied to computers and networks.
 Information Systems Security - controlling access to
systems and protecting the integrity, availability and
confidentiality of information - is a critical concern of
the executive management of any corporation or
government agency.
Confidentiality, Integrity
and Availability (CIA):-
Confidentiality;-
 Confidentiality refers to
limiting information access
and disclosure to authorized
users -- "the right people" --
and preventing access by or
disclosure to unauthorized
ones -- "the wrong people."
Confidentiality, Integrity and
Availability (CIA):-
Integrity
 Integrity refers to the
trustworthiness of
information resources.
 On a more restrictive view,
however, integrity of an
information system includes
only preservation without
corruption of whatever was
transmitted or entered into
the system, right or wrong.
Confidentiality, Integrity and
Availability (CIA):-
Availability
 Availability refers,
unsurprisingly, to the
availability of information
resources
 An information system that
is not available when you
need it is almost as bad as
none at all.
 The assets of the e-business services and other
electronic services should be protected in order to
preserve the authenticity, confidentiality, integrity and
availability of the service. The assets of these
electronic services are:
 The data of organizations and citizens using
electronic service.
 The assets of the electronic business or activity
service itself (e.g. systems, networks, information).
 Data and information related to the remote control of
networked home based equipment and systems.
 User authentication credentials.
What can go wrong?
 Human error: e.g. entering incorrect transactions;
failing to spot and correct errors; processing the
wrong information; accidentally deleting data.
 Technical errors: e.g. hardware that fails or
software that crashes during transaction processing.
 Accidents and disasters: e.g. floods, fire.
 Fraud - deliberate attempts to corrupt or amend
previously legitimate data and information.
What can go wrong?
 Commercial espionage: e.g. competitors
deliberately gaining access to commercially-sensitive
data (e.g. customer details; pricing and profit margin
data, designs).
 Malicious damage: where an employee or other
person deliberately sets out to destroy or damage
data and systems (e.g. hackers, creators of viruses)
How the attack took
place …
 The attack heavily affected infrastructures of all
network:
 Routers damaged.
 Routing tables changed.
 DNS servers overloaded.
 Email servers mainframes failure, and etc
Facts:
 We don’t know what’s on our own nets
 What’s on our nets is bad, and existing practices
aren’t finding everything
 Threat is in the “interior”
 Threat is faster than the response
 “Boundaries” are irrelevant
 We don’t know what is on our partner’s nets nor on
the points of intersection
 Compromises occur despite defenses
 Depending on the motivation behind any particular
threat, it can be a nuisance, costly or mission
threatening
How Can Information Systems be Made More Secure?
 There is no such thing as failsafe security for
information systems. When designing security
controls, a business needs to address the following
factors;
1. Have a Plan
 Prepare actionable steps for yourself and other
users of your network to follow if your network is
attacked or appears to have been. Unlike attacks on
physical property, cyber attacks sources can
sometimes be difficult to identify. Response plans,
therefore, should go into effect as soon as a system
appears to have been compromised, and then the
source of the problem –whether accidental or
malicious—can be sought.
2. Back up Critical Information
 Everyone, from the largest corporation to individual
users, should have a system for backing up their
critical information and databases. This is so crucial
it's worth saying again: everyone should have a back
up system in place!.And yet, it is rarely necessary to
back up an entire system. Instead, individuals and
small business will want to select what to back up in
case of an attack or disaster.
6. Make Sure that Everyone
Knows What to Do and Expect
 The day of an apparent attack should not be the first
time system operators, managers, and employees
see instructions on how to respond. Response plans
need to be practiced and made part of an overall
prevention strategy. Staging mock attacks or "red
teaming" is an excellent way to identify weaknesses
and areas to be strengthened in existing response
strategies, while reinforcing proper response
methods.
Business benefits of good
information security
 Managing information security is often viewed as a headache
by management. It is often perceived as adding costs to a
business by focusing on "negatives" - i.e what might go wrong.
 However, there are many potential business benefits from
getting information system security right: for example:
 - If systems are more up-to-date and secure - they are also
more likely to be accurate and efficient
- Security can be used to "differentiate" a business – it helps
build confidence with customers and suppliers
- Better information systems can increase the capacity of a
business. For example, adding secure
online ordering to a web site can boost sales enabling
customers to buy 24 hours a day, 7 days a week
- By managing risk more effectively – a business can cut down
on losses and potential legal liabilities
Prepared By:
 Shakil Zareen
 Sulaiman Javed
 Syed Asif Sherazi

More Related Content

What's hot

Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
ErAdityaSingh1
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Information security
Information securityInformation security
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of Cybersecurity
Benoit Callebaut
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
Bharath Rao
 
12 security policies
12 security policies12 security policies
12 security policies
Saqib Raza
 
information security management
information security managementinformation security management
information security management
Gurpreetkaur838
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
GulnurAzat
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
Department of Defense
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Deepak Pareek
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
Dinesh582831
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
jayashri kolekar
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
Ahmed Musaad
 

What's hot (20)

Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Social engineering
Social engineering Social engineering
Social engineering
 
Information security
Information securityInformation security
Information security
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of Cybersecurity
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
12 security policies
12 security policies12 security policies
12 security policies
 
information security management
information security managementinformation security management
information security management
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 

Similar to Information System Security

Cloud computing risks
Cloud computing risksCloud computing risks
Cloud computing risks
sripriya78
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
Meg Weber
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
V2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
V2Infotech1
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
madunix
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
Jazmine Brown
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
Precise Testing Solution
 
Data security
Data securityData security
Data security
AbdulBasit938
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
banerjeea
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
security IDS
security IDSsecurity IDS
security IDS
Gregory Hanis
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
Faisal Yahya
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
AkankshaPathak27
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
Infosectrain3
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
Emmanuel Oshogwe Akpeokhai
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Secninjaz Technologies LLP
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
Skillmine Technology Consulting
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
Skillmine Technology Consulting
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
YounesChafi1
 

Similar to Information System Security (20)

Cloud computing risks
Cloud computing risksCloud computing risks
Cloud computing risks
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
 
Data security
Data securityData security
Data security
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
security IDS
security IDSsecurity IDS
security IDS
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 

Recently uploaded

Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
EducationNC
 
Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
whatchangedhowreflec
 
The basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptxThe basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptx
heathfieldcps1
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
pol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdfpol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdf
BiplabHalder13
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
 
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
Nguyen Thanh Tu Collection
 
What are the new features in the Fleet Odoo 17
What are the new features in the Fleet Odoo 17What are the new features in the Fleet Odoo 17
What are the new features in the Fleet Odoo 17
Celine George
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
nabaegha
 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
Celine George
 
IoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdfIoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdf
roshanranjit222
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Celine George
 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
MattVassar1
 
Interprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdfInterprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdf
Ben Aldrich
 
How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17
Celine George
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT KanpurDiversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 

Recently uploaded (20)

Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
 
Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
 
The basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptxThe basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptx
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
pol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdfpol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdf
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
 
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
 
What are the new features in the Fleet Odoo 17
What are the new features in the Fleet Odoo 17What are the new features in the Fleet Odoo 17
What are the new features in the Fleet Odoo 17
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
 
IoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdfIoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdf
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
 
Interprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdfInterprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdf
 
How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
 
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT KanpurDiversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT Kanpur
 

Information System Security

  • 1.
  • 2. Presented To: Dedicated To: Arfa Abdul Karim Randhawa was a Pakistani student and computer prodigy, who in 2004 at the age of nine years became Microsoft Certified Professional, the youngest in the world Honourable And Respectable Mr. Ahmer Umer
  • 3. What Is Information Security…?  Computer security is information security as applied to computers and networks.  Information Systems Security - controlling access to systems and protecting the integrity, availability and confidentiality of information - is a critical concern of the executive management of any corporation or government agency.
  • 4. Confidentiality, Integrity and Availability (CIA):- Confidentiality;-  Confidentiality refers to limiting information access and disclosure to authorized users -- "the right people" -- and preventing access by or disclosure to unauthorized ones -- "the wrong people."
  • 5. Confidentiality, Integrity and Availability (CIA):- Integrity  Integrity refers to the trustworthiness of information resources.  On a more restrictive view, however, integrity of an information system includes only preservation without corruption of whatever was transmitted or entered into the system, right or wrong.
  • 6. Confidentiality, Integrity and Availability (CIA):- Availability  Availability refers, unsurprisingly, to the availability of information resources  An information system that is not available when you need it is almost as bad as none at all.
  • 7.  The assets of the e-business services and other electronic services should be protected in order to preserve the authenticity, confidentiality, integrity and availability of the service. The assets of these electronic services are:  The data of organizations and citizens using electronic service.  The assets of the electronic business or activity service itself (e.g. systems, networks, information).  Data and information related to the remote control of networked home based equipment and systems.  User authentication credentials.
  • 8. What can go wrong?  Human error: e.g. entering incorrect transactions; failing to spot and correct errors; processing the wrong information; accidentally deleting data.  Technical errors: e.g. hardware that fails or software that crashes during transaction processing.  Accidents and disasters: e.g. floods, fire.  Fraud - deliberate attempts to corrupt or amend previously legitimate data and information.
  • 9. What can go wrong?  Commercial espionage: e.g. competitors deliberately gaining access to commercially-sensitive data (e.g. customer details; pricing and profit margin data, designs).  Malicious damage: where an employee or other person deliberately sets out to destroy or damage data and systems (e.g. hackers, creators of viruses)
  • 10. How the attack took place …  The attack heavily affected infrastructures of all network:  Routers damaged.  Routing tables changed.  DNS servers overloaded.  Email servers mainframes failure, and etc
  • 11. Facts:  We don’t know what’s on our own nets  What’s on our nets is bad, and existing practices aren’t finding everything  Threat is in the “interior”  Threat is faster than the response  “Boundaries” are irrelevant  We don’t know what is on our partner’s nets nor on the points of intersection  Compromises occur despite defenses  Depending on the motivation behind any particular threat, it can be a nuisance, costly or mission threatening
  • 12. How Can Information Systems be Made More Secure?  There is no such thing as failsafe security for information systems. When designing security controls, a business needs to address the following factors;
  • 13. 1. Have a Plan  Prepare actionable steps for yourself and other users of your network to follow if your network is attacked or appears to have been. Unlike attacks on physical property, cyber attacks sources can sometimes be difficult to identify. Response plans, therefore, should go into effect as soon as a system appears to have been compromised, and then the source of the problem –whether accidental or malicious—can be sought.
  • 14. 2. Back up Critical Information  Everyone, from the largest corporation to individual users, should have a system for backing up their critical information and databases. This is so crucial it's worth saying again: everyone should have a back up system in place!.And yet, it is rarely necessary to back up an entire system. Instead, individuals and small business will want to select what to back up in case of an attack or disaster.
  • 15. 6. Make Sure that Everyone Knows What to Do and Expect  The day of an apparent attack should not be the first time system operators, managers, and employees see instructions on how to respond. Response plans need to be practiced and made part of an overall prevention strategy. Staging mock attacks or "red teaming" is an excellent way to identify weaknesses and areas to be strengthened in existing response strategies, while reinforcing proper response methods.
  • 16. Business benefits of good information security  Managing information security is often viewed as a headache by management. It is often perceived as adding costs to a business by focusing on "negatives" - i.e what might go wrong.  However, there are many potential business benefits from getting information system security right: for example:  - If systems are more up-to-date and secure - they are also more likely to be accurate and efficient - Security can be used to "differentiate" a business – it helps build confidence with customers and suppliers - Better information systems can increase the capacity of a business. For example, adding secure online ordering to a web site can boost sales enabling customers to buy 24 hours a day, 7 days a week - By managing risk more effectively – a business can cut down on losses and potential legal liabilities
  • 17. Prepared By:  Shakil Zareen  Sulaiman Javed  Syed Asif Sherazi
  翻译: