SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.

Slides:



Advertisements
Similar presentations
How to Log on & Log off of a Laptop and why it’s important.
Advertisements

CREATED BY: HMIS Security Awareness Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Auditing Computer Systems
Chapter 17 Controls and Security Measures
Security+ Guide to Network Security Fundamentals
Information System Security Engineering and Management Risk Analysis and System Security Engineering Homework (#2, #3) Dr. William Hery
Risks, Controls and Security Measures
MJ10/07041 Session 10 Accounting, Security Management Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Chapter 19 Security.
DATABASE SECURITY By Oscar Suciadi CS 157B Prof. Sin-Min Lee.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Security Awareness Norfolk State University Policies.
Information Security Update CTC 18 March 2015 Julianne Tolson.
SECURING DATA FOR ER STAFF Windy L. Newton May 29, 2015.
1.1 System Performance Security Module 1 Version 5.
Computer & Network Security
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Today’s Lecture Covers < Chapter 6 - IS Security
CSC8320. Outline Content from the book Recent Work Future Work.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Security Training USAID Information Security.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
ACM 511 Introduction to Computer Networks. Computer Networks.
Information Security Training for People who Supervise Computer Users.
Information Security What is Information Security?
Privacy, Confidentiality, and Security Component 2/Unit 8c.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
Csci5233 Computer Security & Integrity 1 Overview of Security & Java (based on GS: Ch. 1)
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Communications & Networks National 4 & 5 Computing Science.
By: Nathan Narvaez. A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office.
Computer Security By Duncan Hall.
Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing All Rights Reserved.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Electronic Commerce Semester 1 Term 1 Lecture 14.
1 (c) 2013 FabSoft. MOST Cloud Service What is a Cloud Service? A cloud service is internet-based, meaning that MOST is hosted on a server farm on the.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Jeff Warnock COSC 352 Indiana University of Pennsylvania Spring 2010.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
8 – Protecting Data and Security
Security Of Information Systems
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Chapter 17 Risks, Security and Disaster Recovery
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
IS4680 Security Auditing for Compliance
Database Security &Threats
DATABASE SECURITY For CSCL (BIM).
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Session 1 – Introduction to Information Security
Presentation transcript:

SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind

Agenda Information Security Information Confidentiality Types of Information Security –Physical –Electronic Network Security Password Protection Assignment!

Information Security The protection of information against unauthorized disclosure, transfer, modification, whether accidental or intentional

Why is it important? Reduce risk of systems ceasing operations Maintain information confidentiality Ensure integrity and reliability of data resources Ensure compliance with national security laws and privacy policies.

Information Confidentiality Is this really necessary if information security is already in place? YES !

Types of Information Security Physical –Preventing physical access or dame to components for an information system Electronic –Preventing access to information systems through communication lines –Ex. Passwords, Data Encryption

Network Security Protecting network resources so that unauthorized users can’t gain access to them In LAN’s and WAN’s –Authentication –Access permission –Password protected

Types of Network Security Systems Firewalls –H/W and S/W placed between an internal network and external network to prevent outsiders from invading private networks VPN’s –A blend of security technologies, to secure traffic as it flows between two or more endpoints.

Password Protection Do not store your password near your computer Have your password be at least 6 characters long Use non-alpha characters and capital letters ex. KaTis15 Do not use easy to guess selections ex Use non-personal selections No password sharing Change your password every 2-3 weeks Always remember to log out!

What Measures do you take to protect your documents?

Password Protecting Your Documents Go to File Save As Click on Tools Select General Options Enter passwords

ASSIGNMENT!