“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

Ethics, Privacy and Information Security
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
1 MODULE 10 : Assuring Reliable and Secure IT Services Matakuliah: J0422 / Manajemen E-Corporation Tahun: 2005 Versi: 1 / 2.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security+ Guide to Network Security Fundamentals
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
IS 380 OME 1 Fall 2010 Class 1. Administrative Roster Syllabus Review Class overview 10 domains overview.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Lecture 11 Reliability and Security in IT infrastructure.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Reliability and Security in IT infrastructure.
Chapter 3 Ethics, Privacy & Security
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Information Systems
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Computer Crime and Information Technology Security
1 IS 8950 Managing Network Infrastructure and Operations.
Cloud Models – Iaas, Paas, SaaS, Chapter- 7 Introduction of cloud computing.
Assuring Reliable and Secure IT Services Chapter 6.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Prepared by: Dinesh Bajracharya Nepal Security and Control.
C8- Securing Information Systems
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Chapter 6 of the Executive Guide manual Technology.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
The Beneficent the MERCIFUL In the NAME of. “ASSURING RELIABLE AND SECURE IT SERVICES”
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Applegate, L.M., Austin, R.D, and Soule, D.L., Corporate Information Strategy and Management, 8 th edition, Burr Ridge, IL: McGraw-Hill/Irwin, 2009 Instructor’s.
Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Appendix C: Designing an Operations Framework to Manage Security.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Module 11: Designing Security for Network Perimeters.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Assuring Reliable and Secure IT Services Chapter 6.
INTERNET & ONLINE COMMUNITY Week 14. RECAP Remember “Analysing the Social Web”? Why would we want to do that? Propagation – what is it and how.
Safe’n’Sec IT security solutions for enterprises of any size.
IS3220 Information Technology Infrastructure Security
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Securing Information Systems
Risk management.
Working at a Small-to-Medium Business or ISP – Chapter 8
Network Security Basics: Malware and Attacks
Chapter 17 Risks, Security and Disaster Recovery
Securing Information Systems
Malware, Phishing and Network Policies
Networking and Security Issues in Digital Library
The University of Adelaide, School of Computer Science
Networking for Home and Small Businesses – Chapter 8
– Communication Technology in a Changing World
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

“Assuring Reliable and Secure IT Services”

IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes downtime? Privacy? Security? Normal Accidents?

Retool Your Data Center Transforming a data center for e-business is almost like rebuilding a 747 while it's flying. "The real challenge is to provide continuous application availability while changing everything around you." The most fundamental way to ease the transition is to get a better understanding of your business model, customer needs and how applications interact with one another in a Web-enabled world. Have an architecture that lets administrators add, remove, test or repair hardware and software - without taking down the complex.

Availability Math Availability of Components in Series The effect of Redundancy on Availability High Availability Facilities N+1 And N+N Redundancy

Availability Math The Availability of Components in the Series

Availability Math The Effects of Redundancy on Availability

Availability Math High-Availability Facilities Uninterruptible Electric Power Delivery Physical Security Climate Control and Fire Suppression Network Connectivity Help Desk and Incident Response Procedures

Availability Math N + 1 and N + N Redundancy N+1 means that for each type of critical component there should be at least one unit standing by. N+N redundancy requires twice as many mission-critical components as are necessary to run a facility at any one time.

Securing Infrastructure against Malicious Threats External Attacks and Intrusion External attacks are actions against computing infrastructure that harm it or degrade its services without actually gaining access to it. The most common is DOS or “Denial of Service”. A distributed DOS attacks use automated routines secretly deposited on Internet-connected computers. Spoofing is used by clever attackers to simulate a distributed attack by inserting false origin information into packets to mislead filtering software at a target site. Intrusion occurs when an intruder gains access to a company’s internal IT infrastructure by a variety of methods. Viruses and worms are malicious software programs that replicate, spreading themselves to other computers.

Securing Infrastructure Against Malicious Threats Classification of Threats – External Attacks – Intrusion – Viruses and Worms Defensive Measures – Firewalls – Security Policies – Authentication – Encryption – Patching and Change Management – Intrusion Detection and Network Monitoring

Securing Infrastructure against Malicious Threats Defensive measures Security Policies Firewalls Authentication Encryption Patching and Change Management Intrusion Detection and Network Monitoring

Securing Infrastructure against Malicious Threats A Security Management Framework Make Deliberate Security Decisions Consider Security a Moving Target Practice Disciplined Change Management Educate Users Deploy Multilevel Technical Measures, as Many as You Can Afford

A Security Management Framework Make Deliberate Security Decisions Consider Security a Moving Target Practice Disciplined Change Management Educate Users Deploy Multilevel Technical Measures, as many as you can afford

Securing Infrastructure against Malicious Threats Risk Management of Availability and Security

Risk Management of Availability and Security See Figure 6.9 Managing Infrastructure Risk p445 Incident Management and Disaster Recovery – Managing incidents before they occur – Managing incidents when they occur – Managing incidents after they occur

Securing Infrastructure against Malicious Threats Incident Management and Disaster Recovery Managing Incidents before They Occur Managing during an Incident Managing after an Incident

Executive questions to access their own preparedness for the 21 st century challenges Go to page 448.