18
SECURITY MANAGEMENT INTRODUCTION AND TOOLS By: PARAG YEVAGE ROLL NO : 49

Security management and tools

Embed Size (px)

Citation preview

Page 1: Security management and tools

SECURITY MANAGEMENT INTRODUCTION AND TOOLS

By: PARAG YEVAGE

ROLL NO : 49

Page 2: Security management and tools

Index :

What is security management? Goals of security management. Tools for security management. Encryption. Firewall. E-mail Monitoring. Biometric Disaster Recovery.

Page 3: Security management and tools

What is security management?

set of functions that protects telecommunications networks

systems from unauthorized access by persons, acts, or influences

such as creating, deleting, and controlling security services

controlling the distribution of cryptographic keying material; and authorizing subscriber access, rights, and privileges.

Page 4: Security management and tools

Defination:

The protection of information assets from unauthorized disclosure, modification or destruction by either accidental or intentional means.

Page 5: Security management and tools

Goals Of Security Management:

Accuracy, integrity and safety of information system activities and resources.

Controls can minimize errors, fraud and destruction in the internet worked information systems that interconnect today’s end users and organizations.

Quality assurance for information systems.

Page 6: Security management and tools

Encryption Firewalls

Tools

Disaster Recovery E-mail Monitory

Page 7: Security management and tools

Encryption :

“In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.”

Page 8: Security management and tools

Encryption Process :

Page 9: Security management and tools

Need Of Encryption :

Keep confidential information safe Prevent exposure of information while in transit across an unsecure medium

Prevent exposure of information when a storage device is lost or stolen

Oregon Identity Theft Protection Act (Senate Bill 583) “safe harbor”

Page 10: Security management and tools

Firewalls :

Device to protect networks

Software & hardware format

Based upon a set of rules

Page 11: Security management and tools

Working Of Firewall :

Page 12: Security management and tools

E-mail Monitoring :

Employee use of electronic mail (e-mail) during business hours is a common characteristic of the 21st century workplace.

According to a recent study, over 130 million workers are currently flooding recipients with 2.8 billion e-mail messages each day.

 Employers provide e-mail services to their employees as an efficient means of facilitating both intra-company communication and communication with the outside client base.

Page 13: Security management and tools

Security Services for E-mails :

Privacy Authentication Integrity Non-repudiation Proof of delivery Audit

Page 14: Security management and tools

Biometric Security :

Biometric it is high technology security system which relies on detailed measurements of the human body.

Biometric control devices use special purpose sensors to measure and digitize biometric profile of an individuals fingerprints, voice of other physical trait.

Page 15: Security management and tools

Such as :- Fingerprint Facial recognition Hand geometry Iris scan Retina scan DNA Speech recognition Signature recognition

Page 16: Security management and tools

Disaster Recovery :

There are different threats are include such as hurricanes, earthquake, tsunami, lightning, fires, floods, criminal and terrorist acts and human error can an severely damage an organization’s computing resources.

Therefore, organizations develop disaster recovery procedures and formalize them in disaster recovery plan.

Page 17: Security management and tools

Disaster Management :

Identify your resources. Identify your risk. Recovery Strategies.

Page 18: Security management and tools

Thank you