Presentation is loading. Please wait.

Presentation is loading. Please wait.

MIS323 – Business Telecommunications Chapter 10 Security.

Similar presentations


Presentation on theme: "MIS323 – Business Telecommunications Chapter 10 Security."— Presentation transcript:

1 MIS323 – Business Telecommunications Chapter 10 Security

2 Security Discussion Introduction to Security Corporate Security Security Breach Case How would you handle the situation? What did they do wrong and what changes would you suggest? Personal Security Personal Security Assessment Security Tools 2 Copyright 2010 John Wiley & Sons, Inc

3 10.1 Introduction Security has always been a major business concern  Computers and Internet have redefined the nature of information security Laws and enforcement in cyber crime

4 Security Incidents & Financial Impact Computer security increasingly important

5 Types of Security Threats Business continuity planning related threats  Intrusion

6 Network Controls Mechanisms that reduce or eliminate the threats to network security Types of controls: 

7 10.2 Risk Assessment A key step in developing a secure network Assigns level of risks to various threats Use a control spreadsheet

8 10.3 Ensuring Business Continuity Make sure that organization’s data and applications will continue to operate even in the face of disruption, destruction, or disaster Continuity Plan includes two major parts: 1. 2.

9 Specifics of Continuity Plan

10 Preventing Computer Viruses Viruses spreads when infected files are accessed Worms Incoming e-mail messages are most common source of viruses

11 Preventing Denial of Service Attacks DoS attacks Distributed DoS (DDoS) Difficult to prevent DoS and DDoS attacks

12 10.4 Intrusion Prevention Types of intruders 

13 Intrusion Prevention Requires a proactive approach that includes routinely testing the security systems Best rule for high security Security Policy

14 Security Holes Made by flaws in network software that permit unintended access to the network Once discovered, knowledge about the security hole quickly circulated on the Internet Examples: RSA – a fradulent email that took advantage of a hole in adobe flash

15 Preventing Social Engineering Breaking security by simply asking how Attackers impersonate others on the phone to ask for information Attackers have good social skills and can manipulate people

16 Phishing Emails

17 Managing Users Screen and classify both users and data Review the effect of any security software Provide adequate user training on network security

18 Security Used at Orgs – CSI Survey 18

19 Personal Security: Risk Assessments Disruption, Disaster and Power Loss Backup Drives Cloud computing

20 Personal Security: Risk Assessments Virus and Malware Protection Malwarebytes Antivirus Software

21 Personal Security: Risk Assessments Intrusion Secure Devices Personal Firewall Prey Project


Download ppt "MIS323 – Business Telecommunications Chapter 10 Security."

Similar presentations


Ads by Google