Download Data Security - Devi Ahilya Vishwavidyalaya

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Deep packet inspection wikipedia , lookup

Cryptanalysis wikipedia , lookup

Airport security wikipedia , lookup

Wireless security wikipedia , lookup

Cyberwarfare wikipedia , lookup

Information privacy law wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Operation AntiSec wikipedia , lookup

Security-focused operating system wikipedia , lookup

Mobile security wikipedia , lookup

Cyberattack wikipedia , lookup

Distributed firewall wikipedia , lookup

Information security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Computer security wikipedia , lookup

Social engineering (security) wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Information Security
By
Bhupendra Ratha, Lecturer
School of Library & Information Science
D.A.V.V., Indore
E-mail:[email protected]
Outline of Information Security










Introduction
Impact of information
Need of Information Security.
Objectives of Information Security.
Areas of Information Security.
Types of attackers
Why attacks?
Methods of Attacking on the Information
Methods of Defending the Information
Tips for the Information Security
Introduction

Information Security is a complicated area and can
be addressed by well-trained and experienced
Professionals.
 “When there is an attack on the system with the
help of different threats, it means that our system is
working very slowly, damaged and our
information are unsecured” is called Information
insecurity. This is a very big problem.
 The Information Security is the solution for it.
Importance of Information

Our work is based on records (information).
 We spend minimum half our day with documents
 15% of Rs. spent managing documents.
 Can’t work without data, record or information
Need of Information Security

To privacy of our Data/Information
 To safely data saving
 Theft own Data/Information
 To avoid bad use of our data
 Lack of time
 Lack of money
 Lack of human resources
Objectives of Data/Inf. Security
Availability
Confidentiality
Objectives of Data/Info. security
Integrity
Authenticity
Security Areas

Basically three areas of security
1.
Physical security
Network security
Database Security
2.
3.
Physical Security

Keep the servers in locked room with network and
power cables snipped off.
 Security of other hardware and machinery
Network Security

Network security all entry points to a network should be guarded.
Switch
Unprotected Network
Server
Internet
Printer
Workstation
Modem
Firewall
Scanner
Protected LAN
Database Security

Database Integrity
 User Authentication
 Access Control
 Availability
Types of Attackers









Hackers
Lone criminals
Police
Malicious insiders
Press/media
Terrorists
Industrial espionage
National intelligence organizations
Info warriors
Hackers
– Attacks for the challenge
– Own subculture with names, lingo and rules
– Stereotypically young, male and socially
– Can have considerable expertise and passion for
attacks
Lone criminals
– Attack for financial gain
– Cause the bulk of computer-related crimes
– Usually target a single method for the attack
Malicious insiders
– Already inside the system
– Knows weaknesses and tendencies of the
organization
– Very difficult to catch
Press/media
– Gather information for a story to sell papers/
commercial time
Police
–Lines are sometimes crossed when gathering information
to pursue a case
Terrorists
–Goal is disruption and damage.
–Most have few resources and skilled.
National Intelligence Organizations

To investigation of different cases
Industrial Espionage
• To discover a competitors strategic marketing
Info warriors
– Military based group targeting information or
networking infrastructures
– Lots of resources
– Willing to take high risks for short term gain
Why attacks?

To publicity
 To financial gain
 Jealousness
 To fun
 To competition with the person of same field
Specific types of attacks

Engineering attacks
 Physical attacks
 Environmental attacks
Engineering attacks

Viruses
 String of computer code that attaches to other programs and replicates

Worms
 Replicates itself to multiple systems
 Rarely dangerous, mostly annoying

Trojan Horses
 Collects information and sends to known site on the network
 Also can allow external takeover of your system
Cont…
colleague
Attacker
Virus
Our system
Cont..
– Password sniffing
 Collect first parts of data packet and look for login
attempts
– IP Spoofing
 Fake packet to “hijack” a session and gain access
-Port scanning
 Automated process that looks for open networking ports
 Logs positive hits for later exploits
Physical attacks

Equipment failure arising from defective
components.
 Temperature and humidity.
 Physical destruction of hardware and equipment
 Theft or sabotage.
Environmental Attacks

Natural Disasters
Fire, Earthquakes etc.

Man-Made Disasters
War, Chemical Leaks etc.
Methods of Information Security Threats

Backups
 Antivirus Software
 Cryptography
 Biometrics
 Honey pots
 Firewalls
 Burglar alarms
Backups

Backups allow us to restore damaged or
destroyed data.
 We can set up backup servers on the network.
 Backup media are- Floppy disks, external hard
disks, ISP online backup.
Antivirus

Antivirus is a program that we can install on
our computer to detect and remove viruses.
 It is used to scan hard disks, floppy disks,
CDs, for viruses and scan e-mail messages and
individual files, downloads from the Net.
Cryptography

Cryptography is the art of converting info. Into a
secret code that can be interpreted only by a person
who knows how to decode it.
Encrypted
Cipher text
Plain text
Decrypted
Example of Cryptography
Original message
Sender
Encrypted
Original message
Receiver
Decrypted
Bioinformatics

The bioinformetics authentication process uses a
person’s unique physical characteristics to
authentically the identity.
 Bioinformatics authentication method fingerprint
recognition, voice authentication, face recognition,
keystroke dynamics and retina.
Fingerprint
Retina
Honey pots

A honey pots is a tool used for detecting an
intrusion attempt.
 A honey pots simulates a vulnerable computer
on a network.
 It contains no critical data or application but has
enough data to lure an intruder.
Honey pots
Intruder
Honey pots
Firewall

A firewall is a tool for the network security
that stand between trusted and entrusted
networks and inspecting all traffic that flows
between them.
 In simple language firewall is a filter
machine that monitors the type of traffic that
flows in and out of the network.
Firewall
Private network
Firewall
Internet
Burglar alarms

Traps set on specific networked objects that
go off if accessed
Tips for information Security









Use of strong password
Adopt a security policy
Use of anti-virus.
Information security officer
Use of firewalls
Use of bioinformatics
Beware to malicious insiders
Security training
Use of other security tools