information security: dbpo
DESCRIPTION
This is a presentation on Information Security module as part of Diploma in Business Process Outsourcing by SOVET, IGNOUTRANSCRIPT
![Page 1: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/1.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
Information Security
Sukant Kole
Advanced Centre for Informatics & Innovative LearningIndira Gandhi National Open University, New Delhi
August 24, 2010
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 2: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/2.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
What is Information Security ?
Definition
Information Security means protection of information andinformation system from unauthorized access, modification andmisuse of information or destruction.
Impact of Weather Forecasting & Flight Scheduling System
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 3: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/3.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
What is Information Security ?
Definition
Information Security means protection of information andinformation system from unauthorized access, modification andmisuse of information or destruction.
Impact of Weather Forecasting & Flight Scheduling System
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 4: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/4.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Integrity
Confidentiality
Availability
Security
Privacy
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 5: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/5.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Integrity
Confidentiality
Availability
Security
Privacy
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 6: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/6.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Integrity
Confidentiality
Availability
Security
Privacy
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 7: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/7.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Integrity
Confidentiality
Availability
Security
Privacy
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 8: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/8.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Integrity
Confidentiality
Availability
Security
Privacy
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 9: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/9.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Physical
(Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Cyber Espionage
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 10: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/10.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Physical
(Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Cyber Espionage
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 11: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/11.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Physical (Malicious insiders, Careless Employees)
Network
Application
(Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Cyber Espionage
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 12: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/12.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Physical (Malicious insiders, Careless Employees)
Network
Application
(Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Cyber Espionage
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 13: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/13.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Physical (Malicious insiders, Careless Employees)
Network
Application
(Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Cyber Espionage
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 14: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/14.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices
Mobile devices, USB Devices
Social Networking
Cloud computing security
Cyber Espionage
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 15: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/15.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices
Mobile devices, USB Devices
Social Networking
Cloud computing security
Cyber Espionage
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 16: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/16.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Cyber Espionage
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 17: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/17.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Cyber Espionage
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 18: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/18.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Cyber Espionage
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 19: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/19.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Cyber Espionage
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 20: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/20.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Physical (Malicious insiders, Careless Employees)
Network
Application (Exploited Vulnerabilities, Zero day attacks)
Access Devices Mobile devices, USB Devices
Social Networking
Cloud computing security
Cyber Espionage
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 21: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/21.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Access restriction to datacentre, Security surveillance,Disaster Recovery
VLAN, Authentication Authorization & Auditing service,WPA-PSK
Security patches, Stable version, 3 tier architecture
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 22: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/22.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Access restriction to datacentre, Security surveillance,Disaster Recovery
VLAN, Authentication Authorization & Auditing service,WPA-PSK
Security patches, Stable version, 3 tier architecture
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 23: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/23.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Access restriction to datacentre, Security surveillance,Disaster Recovery
VLAN, Authentication Authorization & Auditing service,WPA-PSK
Security patches, Stable version, 3 tier architecture
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 24: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/24.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
What is encryption ?
Definition
“....In cryptography, encryption is the process of transforminginformation (referred to as plaintext) using an algorithm (calledcipher) to make it unreadable to anyone except those possessingspecial knowledge, usually referred to as a key. The result of theprocess is encrypted information (in cryptography, referred to asciphertext....” (Source: Wikipedia)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 25: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/25.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Symmetric Encryption
(Ref: http://www.devx.com/dbzone/Article/29232/1954)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 26: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/26.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
Asymmetric Encryption
(Ref: www.uic.edu/depts/accc/newsletter/adn26/figure2.html)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 27: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/27.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
User Policies
(Password, Resource Access)
IT Policies (Backup, firewall, IDS & IPS)
General (Service License Agreement, Business Continuity)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 28: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/28.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
User Policies
(Password, Resource Access)
IT Policies (Backup, firewall, IDS & IPS)
General (Service License Agreement, Business Continuity)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 29: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/29.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
User Policies (Password, Resource Access)
IT Policies
(Backup, firewall, IDS & IPS)
General (Service License Agreement, Business Continuity)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 30: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/30.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
User Policies (Password, Resource Access)
IT Policies
(Backup, firewall, IDS & IPS)
General (Service License Agreement, Business Continuity)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 31: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/31.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
User Policies (Password, Resource Access)
IT Policies (Backup, firewall, IDS & IPS)
General
(Service License Agreement, Business Continuity)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 32: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/32.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
User Policies (Password, Resource Access)
IT Policies (Backup, firewall, IDS & IPS)
General
(Service License Agreement, Business Continuity)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 33: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/33.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies
User Policies (Password, Resource Access)
IT Policies (Backup, firewall, IDS & IPS)
General (Service License Agreement, Business Continuity)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 34: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/34.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Social Engineering attacks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 35: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/35.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Social Engineering attacks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 36: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/36.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Social Engineering attacks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 37: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/37.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Social Engineering attacks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 38: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/38.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Social Engineering attacks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 39: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/39.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Social Engineering attacks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 40: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/40.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
Introduction
Infection process
Viruses
Worm
(Morris Worm, November 2, 1988)
Trojan Horses
Social Engineering attacks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 41: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/41.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
Introduction
Infection process
Viruses
Worm
(Morris Worm, November 2, 1988)
Trojan Horses
Social Engineering attacks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 42: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/42.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Social Engineering attacks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 43: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/43.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Social Engineering attacks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 44: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/44.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
Introduction
Infection process
Viruses
Worm (Morris Worm, November 2, 1988)
Trojan Horses
Social Engineering attacks
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 45: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/45.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
Definition
“....In the field of networking, the specialist area of networksecurity consists of the provisions and policies adopted by thenetwork administrator to prevent and monitor unauthorized access,misuse, modification, or denial of the computer network andnetwork-accessible resources....” (Source: Wikipedia)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 46: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/46.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,Packet flooding)
Unauthorized access to resources (unsecured LAN /WLANnetwork points)
MAC Spoofing, Man-in-the-middle attack
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 47: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/47.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,Packet flooding)
Unauthorized access to resources (unsecured LAN /WLANnetwork points)
MAC Spoofing, Man-in-the-middle attack
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 48: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/48.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,Packet flooding)
Unauthorized access to resources (unsecured LAN /WLANnetwork points)
MAC Spoofing, Man-in-the-middle attack
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 49: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/49.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,Packet flooding)
Unauthorized access to resources (unsecured LAN /WLANnetwork points)
MAC Spoofing, Man-in-the-middle attack
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 50: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/50.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
Denial of Service (ARP Posioning, DNS Cache Poisoning,Packet flooding)
Unauthorized access to resources (unsecured LAN /WLANnetwork points)
MAC Spoofing, Man-in-the-middle attack
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 51: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/51.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Vulnerability Assessment tools (Nessus, Wireshark)
Penetration Testing assessment
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 52: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/52.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Vulnerability Assessment tools (Nessus, Wireshark)
Penetration Testing assessment
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 53: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/53.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Vulnerability Assessment tools (Nessus, Wireshark)
Penetration Testing assessment
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 54: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/54.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Vulnerability Assessment tools (Nessus, Wireshark)
Penetration Testing assessment
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 55: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/55.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Vulnerability Assessment tools (Nessus, Wireshark)
Penetration Testing assessment
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 56: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/56.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Vulnerability Assessment tools (Nessus, Wireshark)
Penetration Testing assessment
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 57: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/57.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Vulnerability Assessment tools (Nessus, Wireshark)
Penetration Testing assessment
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 58: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/58.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Vulnerability Assessment tools (Nessus, Wireshark)
Penetration Testing assessment
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 59: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/59.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
Firewall [Software, Hardware]
Virtual LANs, Virtual Private Networks
Secured and encrypted access to resources
De-Militarized Zones
Intrusion Detection & Prevention System
Honeypots
Directory Services (LDAP, MS-ADS)
Vulnerability Assessment tools (Nessus, Wireshark)
Penetration Testing assessment
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 60: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/60.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
De-Militarized Zones
Virtual LANs
Authentication, Authorization, Auditing Service (Desktop,Web)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 61: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/61.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
De-Militarized Zones
Virtual LANs
Authentication, Authorization, Auditing Service (Desktop,Web)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 62: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/62.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
De-Militarized Zones
Virtual LANs
Authentication, Authorization, Auditing Service (Desktop,Web)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 63: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/63.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
De-Militarized Zones
Virtual LANs
Authentication, Authorization, Auditing Service (Desktop,Web)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 64: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/64.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
What is network securityThreats to network securityTools of network securitySecure network devices
De-Militarized Zones
Virtual LANs
Authentication, Authorization, Auditing Service (Desktop,Web)
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
![Page 65: Information Security: DBPO](https://reader034.vdocuments.us/reader034/viewer/2022051513/54628ba6b1af9f7d228b4f26/html5/thumbnails/65.jpg)
Information Security ConcernsSoftware Vulnerabilties
Network Security and AuthenticationOpen Discussion
Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting