12
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY

Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY

Embed Size (px)

DESCRIPTION

 Downtime:  A period of time when systems are unavailable that results in lost revenues and legal expenses  Primary reasons downtime occurs are power loss and hackers PROTECTING INTELLECTUAL ASSETS

Citation preview

Page 1: Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY

Matt BromanKodiac GambleDevin Nichol

SECTION 4.2INFORMATION

SECURITY

Page 2: Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY

Information Security:Encompassing the protection of information from accidental or intentional misuse from people

Primary tool used to combat threats associated with downtime

PROTECTING INTELLECTUAL ASSETS

Page 3: Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY

Downtime:A period of time when systems are unavailable that results in lost revenues and legal expenses

Primary reasons downtime occurs are power loss and hackers

PROTECTING INTELLECTUAL ASSETS

Page 4: Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY

Hackers:Technology experts who break into computers for either a profit or a challenge

Good or Bad:HactivistsWhite-hat hackersBlack-hat hackersCrackers

SECURITY THREATS

Page 5: Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY

Virus:Software written with intent to annoy or cause damage

Forms:Denial of Service (DoS)

Trojan HorseWorm

SECURITY THREATS

Page 6: Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY

Adware:Software that allows internet advertisers to display ads without consent of the user

Spyware:Special adware that collects data about the user and transmits it over the user without the users knowledge

SECURITY THREATS

Page 7: Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY

Antivirus SoftwareFinds and removes know viruses, adware and spyware.

Keep up to date to protect from new viruses!

SECURITY THREATS

Page 8: Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY

Information Security PlanDetailed process of how a organization will implement information security policies

Information Security Policies Identifying rules to maintain information security

PROTECTING AGAINST HACKERS

Page 9: Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY

Authorization:Process of providing a user with permission including access levels and file access

Authentication:methods for confirming user’s identities

User ID and PasswordSmart Card or TokenFingerprints

TECHNOLOGY DEFENSES

Page 10: Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY

Content Filtering Software that filters

content such as emails to prevent unauthorized information

Encryption scrambles information into

an alternative form that requires a password to decrypt

Firewall Software that guards a

network by analyzing incoming and outgoing information for the correct markings

DATA PREVENTION & RESISTANCE

Page 11: Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY

Intrusion Detection Software (IDS):Monitoring tools that search for patterns in network traffic to identify intruders

Protects against suspicious network traffic and attempts to access files and data

DETECTION & RESPONSE

Page 12: Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY

1. What is one of the primary reasons for the occurrence of downtime?

2. What type of hacker uses their ability for good?

3. What does Spyware do? 4. Name of the methods used for confirming a

user’s identity5. What is the purpose of Intrusion Detection

Software?

QUESTIONS