Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

IT Security

No description
by

Nicolas Dunke

on 21 April 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of IT Security

IT Security
1. What does IT-Security mean ?

2. fundamental questions of IT-Security

3. Threats
physical
virtual

4. Arrangements

5. Comprehensive IT-Security

6. Examples: Incidents in which IT-Security failed

7. IT-Security tips
Classification
What does IT-Security mean?
IT Safety is responsible for the correct operating information systems
IT Security is designed to protect computers, networks and data from unauthorized access
primitive societies
Before the modern age
World War II
development of the world wide web
fundamental questions of IT-Security
Which sector should be secured or is under attack?

Which device is affected?

Against what should the information/system/data be protected?
Threats
physical
virtual
ecological disaster

electromagnetic influence (EMP)

mechanic influence by people

temperature

physical presence during cyber attacks

physical burglary (hardware) / (software - data)
virus, trojan, worm (maleware)

phishing, spoofing

social engineering

denial of service (DoS)

man-in-the-middle
a person in London is detected by more than 300 cameras a day
Who guarantees the security of this huge quantity of private data?
Arrangements
physical and areal protection of databases and servers by complex premises and access controls (fingerprint, PIN, iris scan)

installation of fault-tolerant systems (bears up main functions during a cyber attack or other interferences)

use redundancy to guarantee no outage of the system

create data backups of important data (no grave data loss)

installation of firewalls to keep away the majority of external software/access

the use of encryption to save secret data and personal eMails
Comprehensive IT Security
the connectivity in the own house
the connectivity in cars, planes and every other art of ransportation
the production of goods is taken by machines and robots - our daily energy often comes from nuclear power stations
the global economy and stock exchange is managed by software and hardware
Examples

2009 - criminals had stolen 137 million
credit card information from Heartland

Stratfort - 860.000 credit card information
plus password were stolen from

2011 - 70 million gamers were affected
by the attack on PSN

2012 - 12 Million iOS data were stolen among other things payment methods and positions of iPhone users
IT-Security tips for everyday life
use eMail encryption to protect private messages
backup your data - if your PC crashes effected by a maleware you have a copy
use antivir software and firewalls to defend against external software and attacks
use strong passwords - don't give personal information unless required
Sources
content:
internet:
https://www.ischool.utexas.edu/~netsec/overview.html
http://de.wikipedia.org/wiki/Informationssicherheit
http://www.security-insider.de
http://www.computerwoche.de/a/it-sicherheit-im-neuen-jahr
literature:
Brockhaus Wissen von A-Z
graphics:
http://upload.wikimedia.org/wikipedia/commons/thumb/0/04/National_Security_Agency.svg/1024px-National_Security_Agency.svg.png
http://velocityagency.com/wp-content/uploads/2013/08/go.jpg
http://www.wildsheep.org/images/facebook-logo-2014.png
http://www.wandtattoos.de/images/product_images/original_images/1447_1_wandtattoo_fingerabdruck.gif
http://bilder.t-online.de/b/52/54/62/28/id_52546228/tid_da/ein-sicheres-passwort-ist-1234-sicher-nicht.jpg
http://upload.wikimedia.org/wikipedia/de/thumb/8/83/Avira_Antivirus_Logo.svg/1024px-Avira_Antivirus_Logo.svg.png
http://pctechmag.com/wp-content/uploads/2014/04/logo-kaspersky.jpg
http://www.kidshealthrecord.com/img/logo/nortonSymantec.png
http://parkgott-blog.de/wp-content/uploads/2013/03/Achtung-Phishing-geflschte-PayPal-Mail.png
http://www.it-sicherheitsnews.de/wp-content/uploads/2014/05/Bildschirmfoto-2014-05-24-um-20.12.38.png
http://upload.wikimedia.org/wikipedia/commons/thumb/3/36/McDonald's_Golden_Arches.svg/2000px-McDonald's_Golden_Arches.svg.png
use VPN (virtual private network) to get access to your private/company network and fake your identity
Full transcript