IT Vocab IT = information technology Server Client or host

Slides:



Advertisements
Similar presentations
Separate Domains of IT Infrastructure
Advertisements

Lecture 1: Overview modified from slides of Lawrie Brown.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Security+ Guide to Network Security Fundamentals
IS Network and Telecommunications Risks
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Computerized Networking of HIV Providers Networking Fundamentals Presented by: Tom Lang – LCG Technologies Corp. May 8, 2003.
Outline  Company Profile  Services Provided  Assets  System Schema  Risk Categories  Technical Risks and Mitigation  Summary.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
Anderson School of Management University of New Mexico.
IT Infrastructure Chap 1: Definition
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Monitoring Employees on Networks: Unethical or Good Business?
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
IT in Business Issues in Information Technology Lecture – 13.
Module 11: Designing Security for Network Perimeters.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Separate Domains of IT Infrastructure CS Domains of IT 1. User Domain 2.Workstation Domain 3.LAN Domain 4.LAN to WAN Domain 5.WAN Domain 6.Remote.
CONTROLLING INFORMATION SYSTEMS
Safe’n’Sec IT security solutions for enterprises of any size.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Introduction to Networking. What is a Network? Discuss in groups.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Wireless security. Submitted To: Er. S.K. Soni [Dy. Head,CSE] Submitted By: Gurjeet Barar CSE Branch IV Year(VII sem) A-2 Batch JODHPUR INSTITUTE OF ENGINEERING.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Jeff Warnock COSC 352 Indiana University of Pennsylvania Spring 2010.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
أمن وحماية المعلومات المحاضرة الثانية إعداد/عبدالرحمن محجوب حمد.
CS457 Introduction to Information Security Systems
Chapter 7. Identifying Assets and Activities to Be Protected
Chapter 1 Introduction to Networking
CONNECTING TO THE INTERNET
Secure Software Confidentiality Integrity Data Security Authentication
Security in Networking
JCC Elementary System/Application Domain
Security Securing IS.
IS4550 Security Policies and Implementation
CompTIA Security+ Study Guide (SY0-501)
ISMS Information Security Management System
INFORMATION SYSTEMS SECURITY and CONTROL
How to Mitigate the Consequences What are the Countermeasures?
IS4680 Security Auditing for Compliance
Chapter # 3 COMPUTER AND INTERNET CRIME
Designing IIS Security (IIS – Internet Information Service)
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

IT Vocab IT = information technology Server Client or host Public – open access Private – limited access Client or host Thin - diskless Workstation – fully functioning computer system

IT Vocab A computing system : a configuration of one or more computers along with the software and data.

Tenets of IT Security CS5493

A I C Availability - assets are available in a timely manner. Integrity – assets remain in their expected states. Confidentiality - assets have access controls

What are assets? An asset is something of value: Hardware Software Data Employees Equipment Etc.

AIC and Threat Categories Denial or destruction threats Alteration threats Improper disclosure threats

The Domains of IT Infrastructure User domain Workstation domain LAN domain LAN-to-WAN domain WAN domain Remote Access domain Server (System)/Application domain

Domain Breakdown The IT infrastructure is broken into different domains so security policy can be organized effectively.

IT Domain Security Policy A comprehensive security plan can be devised by considering each separate domain. Identify the threats and vulnerabilities Devise a strategy for eliminating the vulnerabilities.

Vulnerabilities Examples: User – lack of awareness or concern for security policy. Workstation domain – unauthorized access LAN – spreading of malicious software WAN – malicious attacks by anonymous sources Remote access – Data leakage due to loss or theft of electronic devise Server/App – Data loss due to software and hardware failures.

Domain Threat Targets User – misuse of resources, social engineering Workstation – OS, applications LAN – hubs, cables, supporting software, etc. WAN – routers, firewalls, supporting software, etc. Remote Access – VPN Server Application – e-mail, file services, database, etc.