You're about to create your best presentation ever

Free Information Security Powerpoint Template

Create your presentation by reusing a template from our community or transition your PowerPoint deck into a visually compelling Prezi presentation.

Information Security

Transcript: With Firewall connected scenario: Principles of Information Security , Michael E. Whitman and Herbert J. Mattord, 2012. Book 4th edition Information Security Protecting the Global Enterprise, Donald L. Pipkin, Book, 2000 www.consumers.ofcom.org.uk www.searchsecurity.techtarget.com www.en.wikipedia.org www.sans.org Fig 12 the configuration of VPN Tunnel Fig 16 Average client HTTP Traffic Received (bytes/sec)) for Sales B department Fig 13 Average client DB traffic Received (bytes/sec)) for Sales A department Experiment Fig 6 shows Statistics of Sales people A node and B node with Clients DB Maintenance and change Problem Definition Overview Analysis The E- government system is based on information technology and sharing of a large amount of sensitive information, resources, and assets. However the E – government systems are connected to the internet which allows an attackers to attack from anywhere over the world, the attackers they are an interested to find one vulnerability to take advantage of it. That means for installing malicious code that exploits that vulnerabilities, therefore the information security problem appears to be a challenge of the implementation or design of E- government. Whitman, and Mattord (pp12-13) provide the following description of the potential problems of information technology are defined below: Confidentiality: Information has confidentiality when it is protected from disclosure or exposure to unauthorised individuals or systems. Confidentiality ensures that only those with the rights and privileges to access information are able to do so. When unauthorised individuals or systems can view information, confidentiality is breached. Integrity: Information has integrity when it is whole, complete, and uncorrupted. The integrity of information is threatened when the information is exposed to corruption, damage, destruction, or other disruption of its authentic state. Corruption can occur while information is being stored or transmitted. Investigation The Committee on National Security Systems (CNSS) defines information security as the protection of information and its critical elements, including the systems and hardware that use, store and transmit that information. Figure 1 shows that information security includes the broad areas of information security management, computer and data security , and network security . The CNSS model of information security evolved from a concept developed by the computer security industry called the C.I.A. Triangle. The C.I.A. Triangle has been the industry standard for computer security since the development of the information. It is based on the three characteristics of information that give it value to organisations: confidentiality, integrity, and availability. Authenticity: Authenticity of information is the quality or state o f being genuine or original, rather than a reproduction or fabrication. Information is authentic when it is in the same state in which it was created, placed, stored, or transferred. Accuracy: Information has accuracy when it is free from mistakes or errors and it has value that the end user expects. In information has been intentionally or unintentionally modified, it is no longer accurate. Consider, for example, a checking account. You assume that the information contained in your checking account is an accurate representation of your finances. Incorrect information in your checking account can result from external or internal errors. If a bank teller, for instance, mistakenly adds or subtracts too much from your account, the value of the information is changed. Or, you may accidentally enter an incorrect amount into your account register. Availability: Availability enables authorised users, persons or computer systems to access information without interference or obstruction and to receive it in the required format Implementation As we viewing of our results in (Fig 5 ) the time average of DB with Traffic Received (sec) and HTTP with page Response Time (sec) In this case we are going to configure the firewall does not allow the database related traffic to pass through the firewall. This procedure we can be viewed in (Fig 9). After we did configure our firewall to block the database access the graph we are captured in Fig 10 indicated that we just blocked the database traffic to pass through the firewall, but still the salespeople using the Web browse. The firewall does filter for the packets according to its rules which are pre-programmed to reject the database’s packets out and allow to another application such as Web browser packets to pass through the firewall. But we have in this case, which are we want to allow the particular users who are working such as sales department to have access to our database in the server. The solution for that problem is the VPN (Virtual Private Network) or a virtual tunnel connection to send database requests to the server, in next scenario we called it the firewall with Virtual

Information security

Transcript: Netiquette When you choose content from the internet you must be careful what you use because the laws of copyright are strict. The copyright rules are usually found on legit sites with proof of copyright somewhere on their page so you should always look before you use any information, pictures or videos. When working in IT you must be careful when using emails and prevent the inbox from overflowing with spam and other unwanted e-mails. If you do not recognize the sender of an e-mail then delete the email or block the sender. The main reason why e-mails can be so dangerous to a business is because any e-mail may contain a virus or another form of malicious software. Identity theft is dangerous for the victim because the thief steals personal details and uses those details for illegal transactions and other activities, it is more troublesome when the thief cannot be tracked so that means the only person who can account for the crime (s) is the victim. While surfing the internet you may encounter people you think are real but are using false accounts which means that they could want to meet you and you wish to meet them and when you finally meet they are a different age, look different and may have a different name When you are in the workplace you must consider security issues such as the way you sit while handling information on the computer to make sure that only you can see it and that all client information stays confidential. You must also think about making sure that only you can access that computer by creating a user name and password and make sure that all ant-virus and firewalls are up and running to prevent any spyware from infiltrating. Inappropriate behaviour will almost always be encountered whilst surfing the internet. It is very common when using social web sites like Facebook, Myspace, Twitter and many others. If you are becoming a victim of such behaviour then you should be able to either block or report the sender to the administrator of the site. When giving personal details you must always be careful when deciding when to give it and when you do, decide what information to hold back. The information that are okay to give are your; Name Email (work e-mail only) Sort code (on trustworthy sites) The information you should never give are your; Full name Address Bank details Pin Mobile/house number Date of birth If you have given any information then the only people who should be able to see this information are other users unless you edit your privacy settings by going into your options and selecting privacy. Hoaxes pop-ups are designed to fool unwary users into downloading malicious software. They are usually easy to spot because of the message “warning! Virus detected” or similar.

powerpoint template

Transcript: Nobody knows babies like we do! Quality products . Good Customer service. Every Kid really loves this store.. BABYLOU ABOUT US About Us BabyLou was established in 2004. It has been more than a decade since we started, where we have ensured to take care of every need and want of every child and infant under one roof, true to the caption “NO BODY KNOWS BABIES LIKE WE DO”. Our benchmark is to provide 100% customer service and satisfaction and continue to deliver the same with a wide range of toys, garments and Baby Products. Play and Create We Are Best 01 02 03 Block games Building Blocks help Kids to use their brain. PLAY TO LEARN in Crusing Adventures Our Discoveries Enjoy a sunny vacation aboard a luxury yacht with the LEGO® Creator 3in1 31083 Cruising Adventures set. This ship has all the comforts you need, including a well-equipped cabin and a toilet. Sail away to a sunny bay and take the cool water scooter to the beach. Build a sandcastle, enjoy a picnic, go surfing or check out the cute sea creatures before you head back to the yacht for a spot of fishing. Escape into the mountains Disney Little Princes in Also available for your Babies..... Also... Out of The World… Our reponsibility BABYLOU…. Our Responsibility All children have the right to fun, creative and engaging play experiences. Play is essential because when children play, they learn. As a provider of play experiences, we must ensure that our behaviour and actions are responsible towards all children and towards our stakeholders, society and the environment. We are committed to continue earning the trust our stakeholders place in us, and we are always inspired by children to be the best we can be. Innovate for children We aim to inspire children through our unique playful learning experiences and to play an active role in making a global difference on product safety while being dedicated promoters of responsibility towards children.

Now you can make any subject more engaging and memorable