it security
DESCRIPTION
TRANSCRIPT
![Page 1: It security](https://reader035.vdocuments.site/reader035/viewer/2022081821/547d40aab4af9f12148b4776/html5/thumbnails/1.jpg)
PowerPlugs
Templates for PowerPoint
IT SECURITY
Corporate and Government agencies need to proactively protect their critical applications, data and processes from external and internal threats throughout their entire life cycle. By taking a comprehensive and integrated approach to application vulnerability management, agencies can measurably improve operational security, mitigate risks, and reduce costs.
![Page 2: It security](https://reader035.vdocuments.site/reader035/viewer/2022081821/547d40aab4af9f12148b4776/html5/thumbnails/2.jpg)
PowerPlugs
Templates for PowerPoint
IT SECURITY
A recent study indicates that over 93% of information produced is in digital format. The same study also noted that 85% of all criminal, civil, and company violations are done by means of digital Intrusion.
![Page 3: It security](https://reader035.vdocuments.site/reader035/viewer/2022081821/547d40aab4af9f12148b4776/html5/thumbnails/3.jpg)
PowerPlugs
Templates for PowerPoint
POSSIBILITY OF BREACH OF IT SECURITY
• Theft of Company Secrets (client or employee lists)• Employee Sabotage or Terrorism• Credit Card Fraud• Financial Crimes• Embezzlement (money or information)• Economic Crimes• Harassment (sexual)• Child Pornography• Major Crimes• Identity Theft (short or long-term plans)
![Page 4: It security](https://reader035.vdocuments.site/reader035/viewer/2022081821/547d40aab4af9f12148b4776/html5/thumbnails/4.jpg)
PowerPlugs
Templates for PowerPoint
Nature of AttacksInternal
USB
PEN Drives
External Hard
Drives
LAN
External
Web
IM
![Page 5: It security](https://reader035.vdocuments.site/reader035/viewer/2022081821/547d40aab4af9f12148b4776/html5/thumbnails/5.jpg)
PowerPlugs
Templates for PowerPoint
INTERNAL INTRUSIONPen Drive Intrusion
o Details of all pen drives installed on a system
o Recorded as per O/S artifacts with timeline
o Analysis of all pen drives used on different work station on a Network
Local Area Network Intrusion o Any suspected user Login Analysis with Victims computer in the Network
o Artifacts with regard to different incidents taken place during that log on period
![Page 6: It security](https://reader035.vdocuments.site/reader035/viewer/2022081821/547d40aab4af9f12148b4776/html5/thumbnails/6.jpg)
PowerPlugs
Templates for PowerPoint
EXTERNAL INTRUSION1. Web Intrusion
Trojan Malware Spyware
2. Mails
As an Attachment
3. IM
During communicationAttachment
![Page 7: It security](https://reader035.vdocuments.site/reader035/viewer/2022081821/547d40aab4af9f12148b4776/html5/thumbnails/7.jpg)
PowerPlugs
Templates for PowerPoint
NEED OF IT SECURITY
IT Security is now a basic requirement because global computing is inherently insecure. Information Security means protecting information from unauthorized access. Information security is a continue process to protect your information.
![Page 8: It security](https://reader035.vdocuments.site/reader035/viewer/2022081821/547d40aab4af9f12148b4776/html5/thumbnails/8.jpg)
PowerPlugs
Templates for PowerPoint
IT SECURITYCIA Triangle
• Confidentiality• Integrity• Availability
Confidentiality
Ensuring that your information remains confidential and remains with only to those who should access that information.
Information IntegrityKnowing that no one has been able to change your information, so you can depend on its accuracy.
AvailabilityMaking sure that your information is available when you need it.
![Page 9: It security](https://reader035.vdocuments.site/reader035/viewer/2022081821/547d40aab4af9f12148b4776/html5/thumbnails/9.jpg)
PowerPlugs
Templates for PowerPoint
IT INFRASTRUCTURE
• Servers
• Routers
• Firewall
• Network
• Web
• Users
![Page 10: It security](https://reader035.vdocuments.site/reader035/viewer/2022081821/547d40aab4af9f12148b4776/html5/thumbnails/10.jpg)
PowerPlugs
Templates for PowerPoint
OUR PROCESS MODEL
First Phase Identification of Targets
System Fingerprinting, Enumeration, Checking the Information Flow Second Phase Identification of Vulnerabilities and Potential Risks Non Destructive Exploitation of found Vulnerabilities Third Phase Result Collation and Report Writing Giving the Final Report to the Client about total health of I T
Infrastructure. Fourth Phase Suggestions for smooth & secure IT environment and Business
continuity. Recommendation of Industry Best Solutions to maintain secure environment to deal with future Threats and Challenges.
![Page 11: It security](https://reader035.vdocuments.site/reader035/viewer/2022081821/547d40aab4af9f12148b4776/html5/thumbnails/11.jpg)
PowerPlugs
Templates for PowerPoint
THANK YOU