Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Transcript of IT Security
1. What does IT-Security mean ?
2. fundamental questions of IT-Security
5. Comprehensive IT-Security
6. Examples: Incidents in which IT-Security failed
7. IT-Security tips
What does IT-Security mean?
IT Safety is responsible for the correct operating information systems
IT Security is designed to protect computers, networks and data from unauthorized access
Before the modern age
World War II
development of the world wide web
fundamental questions of IT-Security
Which sector should be secured or is under attack?
Which device is affected?
Against what should the information/system/data be protected?
electromagnetic influence (EMP)
mechanic influence by people
physical presence during cyber attacks
physical burglary (hardware) / (software - data)
virus, trojan, worm (maleware)
denial of service (DoS)
a person in London is detected by more than 300 cameras a day
Who guarantees the security of this huge quantity of private data?
physical and areal protection of databases and servers by complex premises and access controls (fingerprint, PIN, iris scan)
installation of fault-tolerant systems (bears up main functions during a cyber attack or other interferences)
use redundancy to guarantee no outage of the system
create data backups of important data (no grave data loss)
installation of firewalls to keep away the majority of external software/access
the use of encryption to save secret data and personal eMails
Comprehensive IT Security
the connectivity in the own house
the connectivity in cars, planes and every other art of ransportation
the production of goods is taken by machines and robots - our daily energy often comes from nuclear power stations
the global economy and stock exchange is managed by software and hardware
2009 - criminals had stolen 137 million
credit card information from Heartland
Stratfort - 860.000 credit card information
plus password were stolen from
2011 - 70 million gamers were affected
by the attack on PSN
2012 - 12 Million iOS data were stolen among other things payment methods and positions of iPhone users
IT-Security tips for everyday life
use eMail encryption to protect private messages
backup your data - if your PC crashes effected by a maleware you have a copy
use antivir software and firewalls to defend against external software and attacks
use strong passwords - don't give personal information unless required
Brockhaus Wissen von A-Z
use VPN (virtual private network) to get access to your private/company network and fake your identity