IT Security
1. What does IT-Security mean ?
2. fundamental questions of IT-Security
3. Threats
physical
virtual
4. Arrangements
5. Comprehensive IT-Security
6. Examples: Incidents in which IT-Security failed
7. IT-Security tips
Classification
What does IT-Security mean?
IT Safety is responsible for the correct operating information systems
IT Security is designed to protect computers, networks and data from unauthorized access
primitive societies
Before the modern age
World War II
development of the world wide web
fundamental questions of IT-Security
Which sector should be secured or is under attack?
Which device is affected?
Against what should the information/system/data be protected?
Threats
physical
virtual
ecological disaster
electromagnetic influence (EMP)
mechanic influence by people
temperature
physical presence during cyber attacks
physical burglary (hardware) / (software - data)
virus, trojan, worm (maleware)
phishing, spoofing
social engineering
denial of service (DoS)
man-in-the-middle
a person in London is detected by more than 300 cameras a day
Who guarantees the security of this huge quantity of private data?
Arrangements
physical and areal protection of databases and servers by complex premises and access controls (fingerprint, PIN, iris scan)
installation of fault-tolerant systems (bears up main functions during a cyber attack or other interferences)
use redundancy to guarantee no outage of the system
create data backups of important data (no grave data loss)
installation of firewalls to keep away the majority of external software/access
the use of encryption to save secret data and personal eMails
Comprehensive IT Security
the connectivity in the own house
the connectivity in cars, planes and every other art of ransportation
the production of goods is taken by machines and robots - our daily energy often comes from nuclear power stations
the global economy and stock exchange is managed by software and hardware
Examples
2009 - criminals had stolen 137 million
credit card information from Heartland
Stratfort - 860.000 credit card information
plus password were stolen from
2011 - 70 million gamers were affected
by the attack on PSN
2012 - 12 Million iOS data were stolen among other things payment methods and positions of iPhone users
IT-Security tips for everyday life
use eMail encryption to protect private messages
backup your data - if your PC crashes effected by a maleware you have a copy
use antivir software and firewalls to defend against external software and attacks
use strong passwords - don't give personal information unless required
Sources
content:
internet:
https://www.ischool.utexas.edu/~netsec/overview.html
http://de.wikipedia.org/wiki/Informationssicherheit
http://www.security-insider.de
http://www.computerwoche.de/a/it-sicherheit-im-neuen-jahr
literature:
Brockhaus Wissen von A-Z
graphics:
http://upload.wikimedia.org/wikipedia/commons/thumb/0/04/National_Security_Agency.svg/1024px-National_Security_Agency.svg.png
http://velocityagency.com/wp-content/uploads/2013/08/go.jpg
http://www.wildsheep.org/images/facebook-logo-2014.png
http://www.wandtattoos.de/images/product_images/original_images/1447_1_wandtattoo_fingerabdruck.gif
http://bilder.t-online.de/b/52/54/62/28/id_52546228/tid_da/ein-sicheres-passwort-ist-1234-sicher-nicht.jpg
http://upload.wikimedia.org/wikipedia/de/thumb/8/83/Avira_Antivirus_Logo.svg/1024px-Avira_Antivirus_Logo.svg.png
http://pctechmag.com/wp-content/uploads/2014/04/logo-kaspersky.jpg
http://www.kidshealthrecord.com/img/logo/nortonSymantec.png
http://parkgott-blog.de/wp-content/uploads/2013/03/Achtung-Phishing-geflschte-PayPal-Mail.png
http://www.it-sicherheitsnews.de/wp-content/uploads/2014/05/Bildschirmfoto-2014-05-24-um-20.12.38.png
http://upload.wikimedia.org/wikipedia/commons/thumb/3/36/McDonald's_Golden_Arches.svg/2000px-McDonald's_Golden_Arches.svg.png
use VPN (virtual private network) to get access to your private/company network and fake your identity
Present Remotely
Send the link below via email or IM
Present to your audience
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article