Informaion Security (2)

Embed Size (px)

Citation preview

  • 8/13/2019 Informaion Security (2)

    1/17

    INFORMATION

    SECURITY

    Priyanka Rao

    Mahendra Pednekar

    Sameer Patil

    Pratiksha Patil

  • 8/13/2019 Informaion Security (2)

    2/17

    Content

    Objectives

    Meaning

    Information security objectives

    Information security managementsystem

    Risk management

    Control of risk management

    Advantages and disadvantages ofinformation security

    Case study

    Conclusion

  • 8/13/2019 Informaion Security (2)

    3/17

    Objectives

    To whole and detail studyabout information securitymanagement, informationsecurity, risk management.

    Also gives guidelines how tosecure our businessinformation.

  • 8/13/2019 Informaion Security (2)

    4/17

    DID YOU KNOW?

    In 1980 a computer cracked a 3-character password within one

    minute. In 1999 a team of computers cracked

    a 56-character password with in one

    day. In 2004 a computer virus infected 1

    million computers within one hour.

  • 8/13/2019 Informaion Security (2)

    5/17

    MEANING Information security is the practice

    of defending information fromunauthorized access, use,disclosure, disruption,modification, perusal, inspection,recording or destruction. It is a

    general term that can be usedregardless of the form the data maytake (electronic, physical, etc...)

  • 8/13/2019 Informaion Security (2)

    6/17

    Information Security Objectives

    IntegrityInformation is Sufficiently Right forthe Purpose at the Time of Use

    AvailabilityInformation is Accessible Whereverand Whenever Required

    ConfidentialityInformation is Available Only to Those

    Who are Authorized to Access it

  • 8/13/2019 Informaion Security (2)

    7/17

  • 8/13/2019 Informaion Security (2)

    8/17

    Risk Management

    Risk management is the process ofidentifying vulnerabilities and threatsto the information resources used byan organization in achieving business

    objectives, and deciding whatcountermeasures, if any, to take inreducing risk to an acceptable level,based on the value of the information

    resource to the organization. For example, the recession that began

    in 2008 was largely caused by theloose credit risk management offinancial firms.

  • 8/13/2019 Informaion Security (2)

    9/17

    Controls of risk management

    When management chooses to mitigate arisk, they will do so by implementing oneor more of three different types ofcontrols.

    control

    administrative

    logical

    physical

  • 8/13/2019 Informaion Security (2)

    10/17

    Advantages of InformationSecurity:

    As technology increases so will the crimesassociated with it. Making the use ofinformation security very worth while.

    It keeps vital private information out of thewrong hands.

    For the government it keeps top secretinformation and capacities out of terrorist and

    enemy nation's hands. Information security protects users valuable

    information both while in use and while it is

    being stored.

  • 8/13/2019 Informaion Security (2)

    11/17

    Disadvantages of InformationSecurity:

    Since technology is always changingnothing will ever be completely secure.

    If a user misses one single area thatshould be protected the whole systemcould be compromised.

    It can be extremely complicated andusers might not totally understand whatthey are dealing with.

  • 8/13/2019 Informaion Security (2)

    12/17

    Case study : on flipkart.com

    Flipkart was founded in 2007 by Sachin Bansaland Binny Bansal, both alumni of theIndianInstitute of Technology Delhi. They workedforAmazon.combefore quitting and foundingtheir own company.

    Flipkart focused on online sales of books, but itlater expanded to electronic goods and a varietyof other products.

    Flipkart offers multiple payment methodslike credit card, debit card, net banking, e-giftvoucher, and the major of all Cash on Delivery.

    http://en.wikipedia.org/wiki/Indian_Institute_of_Technology_Delhihttp://en.wikipedia.org/wiki/Indian_Institute_of_Technology_Delhihttp://en.wikipedia.org/wiki/Amazon.comhttp://en.wikipedia.org/wiki/Credit_cardhttp://en.wikipedia.org/wiki/Debit_cardhttp://en.wikipedia.org/wiki/Net_bankinghttp://en.wikipedia.org/wiki/Cash_on_Deliveryhttp://en.wikipedia.org/wiki/Cash_on_Deliveryhttp://en.wikipedia.org/wiki/Net_bankinghttp://en.wikipedia.org/wiki/Debit_cardhttp://en.wikipedia.org/wiki/Credit_cardhttp://en.wikipedia.org/wiki/Amazon.comhttp://en.wikipedia.org/wiki/Indian_Institute_of_Technology_Delhihttp://en.wikipedia.org/wiki/Indian_Institute_of_Technology_Delhi
  • 8/13/2019 Informaion Security (2)

    13/17

    How to Keep Your OnlineBusiness Information Secure

    Information-technology security becomes even moreimportant when operating a business online.

    Its critical to take the steps necessary to protect an

    online business against hackers who could steal vitalinformation, or viruses which could bring yourcomputer system.

    Of course no system is foolproof. If someone isabsolutely determined to break into your system,given enough time and money, they likely can.

    But its wise to put as many safeguards in place aspossible, so that hackers will look for easier targets.

  • 8/13/2019 Informaion Security (2)

    14/17

    Tips:

    1. Change default passwords and accountnames in place when your computersystem was installed:

    2. Update your computer operatingsystems:

    3. Use encryption software to protectcustomers financial information from

    theft during transactions:4. Limit access of sensitive information to

    those who need to see it.

  • 8/13/2019 Informaion Security (2)

    15/17

    Conclusion

    Its never ending process ofinformation security involves ongoingtraining, assessment, protection,monitoring & detection.

    security depends on people more thanon technology.

    security is not a status or a snapshot,but a running process.

  • 8/13/2019 Informaion Security (2)

    16/17

    Reference:

    www.google.com

    www.wikepedia.com

    http://www.google.com/http://www.wikepedia.com/http://www.wikepedia.com/http://www.google.com/
  • 8/13/2019 Informaion Security (2)

    17/17

    THANK YOU