Upload
gaurav-navale
View
225
Download
0
Embed Size (px)
Citation preview
8/13/2019 Informaion Security (2)
1/17
INFORMATION
SECURITY
Priyanka Rao
Mahendra Pednekar
Sameer Patil
Pratiksha Patil
8/13/2019 Informaion Security (2)
2/17
Content
Objectives
Meaning
Information security objectives
Information security managementsystem
Risk management
Control of risk management
Advantages and disadvantages ofinformation security
Case study
Conclusion
8/13/2019 Informaion Security (2)
3/17
Objectives
To whole and detail studyabout information securitymanagement, informationsecurity, risk management.
Also gives guidelines how tosecure our businessinformation.
8/13/2019 Informaion Security (2)
4/17
DID YOU KNOW?
In 1980 a computer cracked a 3-character password within one
minute. In 1999 a team of computers cracked
a 56-character password with in one
day. In 2004 a computer virus infected 1
million computers within one hour.
8/13/2019 Informaion Security (2)
5/17
MEANING Information security is the practice
of defending information fromunauthorized access, use,disclosure, disruption,modification, perusal, inspection,recording or destruction. It is a
general term that can be usedregardless of the form the data maytake (electronic, physical, etc...)
8/13/2019 Informaion Security (2)
6/17
Information Security Objectives
IntegrityInformation is Sufficiently Right forthe Purpose at the Time of Use
AvailabilityInformation is Accessible Whereverand Whenever Required
ConfidentialityInformation is Available Only to Those
Who are Authorized to Access it
8/13/2019 Informaion Security (2)
7/17
8/13/2019 Informaion Security (2)
8/17
Risk Management
Risk management is the process ofidentifying vulnerabilities and threatsto the information resources used byan organization in achieving business
objectives, and deciding whatcountermeasures, if any, to take inreducing risk to an acceptable level,based on the value of the information
resource to the organization. For example, the recession that began
in 2008 was largely caused by theloose credit risk management offinancial firms.
8/13/2019 Informaion Security (2)
9/17
Controls of risk management
When management chooses to mitigate arisk, they will do so by implementing oneor more of three different types ofcontrols.
control
administrative
logical
physical
8/13/2019 Informaion Security (2)
10/17
Advantages of InformationSecurity:
As technology increases so will the crimesassociated with it. Making the use ofinformation security very worth while.
It keeps vital private information out of thewrong hands.
For the government it keeps top secretinformation and capacities out of terrorist and
enemy nation's hands. Information security protects users valuable
information both while in use and while it is
being stored.
8/13/2019 Informaion Security (2)
11/17
Disadvantages of InformationSecurity:
Since technology is always changingnothing will ever be completely secure.
If a user misses one single area thatshould be protected the whole systemcould be compromised.
It can be extremely complicated andusers might not totally understand whatthey are dealing with.
8/13/2019 Informaion Security (2)
12/17
Case study : on flipkart.com
Flipkart was founded in 2007 by Sachin Bansaland Binny Bansal, both alumni of theIndianInstitute of Technology Delhi. They workedforAmazon.combefore quitting and foundingtheir own company.
Flipkart focused on online sales of books, but itlater expanded to electronic goods and a varietyof other products.
Flipkart offers multiple payment methodslike credit card, debit card, net banking, e-giftvoucher, and the major of all Cash on Delivery.
http://en.wikipedia.org/wiki/Indian_Institute_of_Technology_Delhihttp://en.wikipedia.org/wiki/Indian_Institute_of_Technology_Delhihttp://en.wikipedia.org/wiki/Amazon.comhttp://en.wikipedia.org/wiki/Credit_cardhttp://en.wikipedia.org/wiki/Debit_cardhttp://en.wikipedia.org/wiki/Net_bankinghttp://en.wikipedia.org/wiki/Cash_on_Deliveryhttp://en.wikipedia.org/wiki/Cash_on_Deliveryhttp://en.wikipedia.org/wiki/Net_bankinghttp://en.wikipedia.org/wiki/Debit_cardhttp://en.wikipedia.org/wiki/Credit_cardhttp://en.wikipedia.org/wiki/Amazon.comhttp://en.wikipedia.org/wiki/Indian_Institute_of_Technology_Delhihttp://en.wikipedia.org/wiki/Indian_Institute_of_Technology_Delhi8/13/2019 Informaion Security (2)
13/17
How to Keep Your OnlineBusiness Information Secure
Information-technology security becomes even moreimportant when operating a business online.
Its critical to take the steps necessary to protect an
online business against hackers who could steal vitalinformation, or viruses which could bring yourcomputer system.
Of course no system is foolproof. If someone isabsolutely determined to break into your system,given enough time and money, they likely can.
But its wise to put as many safeguards in place aspossible, so that hackers will look for easier targets.
8/13/2019 Informaion Security (2)
14/17
Tips:
1. Change default passwords and accountnames in place when your computersystem was installed:
2. Update your computer operatingsystems:
3. Use encryption software to protectcustomers financial information from
theft during transactions:4. Limit access of sensitive information to
those who need to see it.
8/13/2019 Informaion Security (2)
15/17
Conclusion
Its never ending process ofinformation security involves ongoingtraining, assessment, protection,monitoring & detection.
security depends on people more thanon technology.
security is not a status or a snapshot,but a running process.
8/13/2019 Informaion Security (2)
16/17
Reference:
www.google.com
www.wikepedia.com
http://www.google.com/http://www.wikepedia.com/http://www.wikepedia.com/http://www.google.com/8/13/2019 Informaion Security (2)
17/17
THANK YOU