0% found this document useful (0 votes)
19 views34 pages

DIS Unit 1

rehy54 6

Uploaded by

Cat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
19 views34 pages

DIS Unit 1

rehy54 6

Uploaded by

Cat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
cw3ssi- Data and Trjornation aay Ut -T - Treeductisn \e Histon: How Moakorre stor 2 Boe Thontis wos the one iho inverted Ane fer Comput Vieus te 1941 He wb oyten Yejened 2o 46 tne "yacwer 3 malware” The pera Compan virs coltigh "Cretper '. 3 (hs muntion yeas nor % conse hain but VOther #2 Rtrmonstrate “ix Porssloibiby y AG vrepitoating code. The Atty - vepltcating Cote Could be Vetta any pov did thjorrnation Secuney HOD ? Tnyownabinn Security has tis yout. 20 ancient ceWingations, woth evidence, oO} encryption Ard Aecture corotount cation reeebeocts dosing back, fe: lL. Anefent Musopotemta (3005 Be) ; Clary tabs Ved for A&cture Communteatio, 2. Anckent Equpt (toe Bed: Htewog ly potas wise yor encwyption Ancient Grrecce (S00 Be): Crear communication. 3 ciprey Wea fer FEO . ye Ancient Rome (100, Be): omypte Fagin) sed per retinue communtcations. In prtroamly jecued oO: t phrpstcak pecunity : Proveeting, recowts and massages from Pryenk Sept or torapering, cary period, tnjormation Security, tone cotter 2 Enon ption: using cots and ctphers 2 Commun chano a Sec akin : vay mnsenyens es td provect and PROSE gayermation An trom’ apse, coaty tomes 9 Bnyormeation Aeurny . foundation jer reokiyn fn yormakien ch continu, 25 evolue praction, wih fn peclnnkogy and Jota the peony wa aavancennets enenging threats, Whar is Seeurtty ? Th qamnah, Seourtty te Aired as "the ox Ato oy betng pecure ~ te be pre’ pron dandert Security often achiomes bY Mons OF Armerat Atroua gts meats: undevbaPen Senuttancouly ov Used £n Combination with one Anvther- Spectartned Arreas ce Secunia Le Prysiaak Seountty, Lontoh eneomparics Statrgie fe promt people, phystcat Oth and fhe workplace prom vayfouy thaveats | Yor, Unawtneriged acess Or ndtienral Peasteny. 2: Operctlions secunity: whteh joc on Aecuning tae Mantnyation’, Ailey fo care) aut ws operational Octirtiny vottrout interruption OY Compromtie, 2 NetuSprie security ; wht oh adaryesses Ye Proetion of an oaningation's data } mnetonxtesng ev cos , Connection, £& Conten bs ana Pre FLY Ao Use thet neticorie fe accomplish Pha AF wingation'’s data Commo ut cation junctions. 4: nyprmation Security; Andudes the lea byoay Areas oy Zoporrnetion secu management, Comapubr & eta aaa & hetooyk hectares. Where “t hax lbeen Used: Lo Gourrerents, retro, franckal Aevtitixbion, | hospitals & private bysinresses, 2. Probecting Congiden tiah Lojormition ia a bueinise rearivernenk - Aspects 9 securly : 3-Teoportant Aapects 3 Typos 1 Seeuntty Attocie: noting acon ie copioroiea sts Arcunty dD) Engormation Oroned by on oxpntegation, S Seouaty attacks or o 2~by pes Possiue, anace - Acti, altace Passive tack * Posstur Attack is a ey pe Y obtacte Lonere An ANAcke, Lotercepts 4 obseruey Communication betrven 150 partis without modtpying ov atkextng tre . data being tranemiitted. The Gok by Parsi attack & to geri Eqyp cmation SUCM' AS + Eavesdropping x Lovexcep Bing & Parenting bo Captuye sensirtie Tnpormation . Wiretapping + en Tver eepti nc) Phone | DY Tnremet Corerauntcadions. . Morttoving fe Poaeiing communteation patterns te tnjer tnyoreration. Ache attacte: Dele a Aype op abtacle Where An artacker oot only intercepts but also moodipies or alters tha Commtnt cation penecen poe ports - The goat actin, attack 6 be: . od data> Altey the Contenbs oy the _Dasere data i Add roaticious data te tht Cormmuntaation + Delete data. Remove | detete parts 3 meg, + Tmperéonati:- Pretend to be One oy the Comm unicaliionn , partis. 2: Seawrity Mectrasiern :. A procss Prat is destqned es denet , prevint or Yeeouer from @& 2 Lecuriby Service :- A Pproeessin. OY Comomunt cabion Apvice that enhanes the aoc oh van Gata Processing Aypbeme and The Anyorrating transfers Oy an organingation. Tre gevies We Intended to County aocuriey arattes, Ord Bey mate, 62 of One OF rote Security mechanis me JP provide thre Service- J} Wrar ie Unyprmation seounty 2: Tnjorrrdlion security is Une practice O protecting Aersitug Injormatlor pom unaenoringed Ccens, Use, disclosure , dbvuption, pandityrcabion ov aeruction, TE fevers ensuring Bae Conpdentiality , Borveg ty ane orditabuily oy feyormation, oe sett ab provectin, agate Vart ous treats Od vrubnerauritars: Tayorration Security (Inyo see) 2nvelws yorious NuOsUTH, sactuadtng | J. nereoor? Scouts 2: crypregraphy 2. ACCS Convo le va geoundy OMDORLN AS raining s Riale raanage rent: The gqooe o% Enyornakion secunthy te probeee pensttius tojprmation prom Vento Li, threats, puch aS Ofer wtacks, phrysccah thet or human trror And ensue , busthess conbinutty. ex TN VEO 2 Oe a I Ot b . va qatrtcal Bronachflytic 9 aiyraes The homacorintics Enyorrnatcon ate | . conpiabaualitey ; | -Detiqgihy 2+ AvoiLaunnil < Prtyoey + Tdentification . + Auithertication . yp 8 Aerovtngation jouw + AccountawWiky Be ACER wom . Porton. Lcongidentiatity congdentialty oy Ragownation ensuyes who onlay dose with auggicenk Privileges oy acerss cortain injornenation. Loken wrprtoged Uedividuiala ow eupeterns can occedd tngor roagion , conptotentratity be preached To provece Une Coote clin Ha tite, oy Lajormnadban , & nurolbey of Mreaeues one weed: . : - Tryormation Clans’ Reation « Setiuve Soturnent storage - ; + Application of generah Security policies + Eduction 9 i thyormation custodians | Bend wers Exampk, & Credtt core pramadion on the Totrneh | “The Suter CUtEmpe bo enjeree ee by encrypting the card OUmber aang Eransm'isston, by Sie th Ve places where te. might appear (ia darabase, 40g, fis, baceups , PRnkd aipt «< So oA) ana by restricting access tO ~ places where te ‘e Stored. Grving out Congictentta Angormatic, ouey Vee tettplhone uw a breach a congctential| iy Phe can be net Quttnovinged to hee | phe Injorrnation, TE eotd reertte in a breach Congicten tiakety. Trteqrity te a Trbegaiby means Pheu: den. Cannot be modifies without athovnation, Ex: Trreqby fovelus is vintatg when an “ernployee, Aetetes Ero portant dara +4, when a compter Virus to fects CO compurr , whee ao, enoployer ig Able to raoctihy) Le O98 ahasr4 In & pare databare, UF S on. Ds A vailadnety , * Fox oar tnyorenation i we see its purpose, the Tayormatiog Must bbe oradlabl. when th in Meck. ~ Exaenple : nigh avalitatnbely auetanns avellave at at tines, Qin, © ~ernain presianting cerita | fisvuptions due to povoe outages ,, PAXOUSENS yatlites ans Bygiern [Link]. POPs The topornation Vio | ia cethctid, Urea ana stored ey, an Sxqantrigation ts) be be Uses only fOr the purposes Stated. ei deta Dune, at bas tmni tt : ¥njormration ott be vised only th wees lenowe te Mie pessoy providing te) _ Dotentigication: An Yopormation systuno Porserics Phe Anorractinist®e op aunbigcation whén Te * Ak. fo yecognings foatrrauak Users: Totenrtpt cation & authentication Wwe te Rouel OF covketrd (means bhe wserrial be FararPishing aces or ante ningation trat an todtadual ia Granted : ’ - Awe cation: , . Dr eccurs when a contsek, Provides Prooy brat aq Wer posseries “Ure iehentity Wat he | she clotms. A wthovthyation . Avex Ure Tclanlty yO Wet us anthenttcabtid , 4 cess CAL author 7 provide acuranc, Wat tre User (tohérhey a persoo / compute) has beer. epectfeatly, ane exxprttly authovinged bi} Me proper fe access, update, or ctelete re abhor conn op & Snyormation asset - Accosnbability ; , Pe tancctinistic Of occountabiity sh When o contred providis Os Lurene. paar Mery actinity undertoken C@n be Atari buted wm a named, pyson ontematid prdeoss Por exdrople: Ludi dogs ear brace wee aw on an Baporenation auprienn provde accoun taki. . or 3 ACeEey : Dafox con YOR aecrarcacy when tr is from murates OF UnDYs. ano ft Veh iey Toyprneation has Volur whine Serues a portt ontar piixpose- This mans Phat uy Enjoanaition “ts awaitake aoe A format raeantng pul ts a -~ ae Tp ue nor sept: “Pio i * tnjorenation cepends On The DPE). Porsresidn : Tr & vee Quatity or aban o} having, ownechtp oF ceil, Jay, apes defect oc tem. ja. N8TISSC security Medes : » Nattonal a "FebeninnesietibanlhS: we ato aflame Sey Came suns’ yabiorak Tvabsing Sandava, JP Layorration coor Pepin. . Bvaluafion Arandars) for. the Aectity op Eojormalion -Gystena + WSTissc wos developed by Mc Guro ber _ McCumber Curbe CThe NSTISSC moods Comrs the "aren oener te by Enjorrrattion seauily it ore checuséion o Aerated quiditines and priteirs tak dircct the 2mplementation o} control. «This capt’ provtdin a. more, Mbsid parepsctine on gcc LTH iyeabknss op Using ton poo Uinttud an approach & fe a Sage Perspectore: as op eo? axis become _ The 3-giminsio ] , © 3 cube With 24 certs ep as atas that must bbe aabirewsess bo sectuntliy podany* tnyprrnation Spims. — To emeure ysitm apy Decay , saan ay Ys Bealls mya be Prpeny acayesed oar tne society process. For Be componants hoe 4% OWT Aeclutiy rregniae men’s: SOftwore + ; cuyite o DS comps: z@ assorted LThe Soptware COMPO’ appt catios, opreoting ae Command. utilitits. .g programs ane Oyen oreaked Urder sre derranaieg conatrolints 9} Projet o- Sankt time, Cost and memginnt , whith Aientt ’ Manpower: Havdvore + Haxdwore o& the physical bectinotogy that hours & Loerie, tee Adprwoorne, ArOrA Ord Commis rhe data & procs VHtenjacs for Une entry 2 vermovak 0) fojormation }rom the | aye i » prnystoah prowrny prttcis aeals vot hh see wa phygsteal Ovek ana wer the protection Oy Tse prgical Ome from harm oF Myt- cag XScation 0} computers . Secrning, Dae phust els ws Eraportat ana the computers Chem becaue a breach 0} prnyeto prone can rele En a Rots Os ingermation Data:- : . Dara stored | proexed and transmitted yhwough o computer system most: Be Probected. + pata % oxen tay most vawable aer™ possessed by an orgpteyption 2X Pre natin target 0} mawmolioral Attacks: / whe Yow, vnorgrerings , chdonee ( Seperety, eeioted) porenviatly vaepul facts « Pywres tab—ane Jatty protsed (reaniplatrd) te Produce in pormation. : : People: : ; i TTreve are trany vous 0} people tn njowsgt Augtims: Coramon One Pack . ~ Systm Arolyst ' eIPNES ronmo _oTechnictan Seas : — Network Maracey —Ppata eri) Operator: ' Preceduys: A procdune 6 A) 2X78 0} clocurentid actions tatan se ache Baceaties A Proceeds % rnore than aiBtraple Apse « A procedure can be guit compl £ Myelid , such PeXfprrning a kacenp , abutting down a system , patching | Networks: eWhen Myormation ystems ON conrctud_ to tacdh other bo form Local Arta Networte (LANs) ard thie LAN, One commecttd PE OThey netoore, Suu as Lriemner, “ew fiechisny CraMenges = Stops to provi networle Arourdhy one. tenplerrentation oy alanry women 4ysem | | | | ShANEAL os te Pee | ara februsion Aysterns EO Owners QrooKre F onqorrg Connprondvses « "5 Secuying he components: | Seountng Ure component Boyes \ protecting bing Cornponiks from porential © Otte ond ebuse by Unariticningedt vers + Surpect 4 an artack: Computr fy Wied AS On Octinn tof fo Conduct the attack. fo Ober | On abtack: Compu itaely ds the enti being otackid Two types of attactes 1.) Direct’ attevete :- a-Indirect attack’ CNS There | Hates Using A Comnputtuy os the iB nce Speen that Sayect y an ve the object 9, an attack, onare : Eq: Compuny 4S the Arebjece Sate " F an attace. be Ditvect, attacks : when a hacker se his persona computer be bveaie Moto a Aujstam: (originale prom bie, Caveat: Frrsth) 2+ Encivece attack, : wher a Syste ve ‘comprorn week ans) ie Ap attack OUney Ayam: Covegtnate kom Q system ov yesourer Wat feaey has been Attacted, and is matpunctioning or working Under me corbyet OH threak ) A computer can therefore Pe beth We subset 2 object aA an oma we ob pers te Sheet & an comprom Weak arn wed Loken yer eovara pe altace oA tan to attacte omer usted , ak which potrt de peemenes Aha sibject oY on attack. Mb Balancing, fo yoxreatron pecunttiy and access: LIy as “deoporstiol 46 ovtoin perject . sstecurnitny — te wnt en absrtute 5 16's & Process. + meourity shouts be constdurg a balance between Prtection ans aveitarntity. » + To aefiene batanee, sre Feet g Ager. must atfou reasonable a couse, Yet Protet ogpins toveats | Approaches ge BOOrrnalion ecurety trop - i . : , — lon :~ t {LD Betton - Pp appreach G> Top- don ‘approach JBvttcen wp Appreack: , ° secures from 2 Oprass ~ yOO> Ofjore ~ Sysieens Adminstrator | Otten pt oa én prose ee pecurreky Oy Phin syste. . Ms boy ANON AGE — technical expertise 3. bre Tratvidual adeninistrators: “Tp cchteue ‘balance, Lae teat op Aecunite must, allows sreaspnable , yet provect against, threats. . 3) Top- down approach: , + Detttakd by Upper managernenp . ose potter, procedures 2 processes ~dctat te goa and expected Orettonies O bhe pproeerses. project : ~ determine Who 1s Accountable for cach by Ure veapitred ackions. + This approach has strong upper management “aepoee v, a dedicattd Champion , Haicard pending | clean \ PRanitng ‘ane the Chance bo Pnylrence ord anizationad criltere> + Ma) Also foveue a jormal Arartopment Abrategy vejerred ‘ip ae. a aysbems dlemulopraent Etje cycle: Top-dnon Ofpoacs Berisen as Ft4 Approatus To ‘Securd Aropitnentalion i |. SDLe: Systenos Demetoprnent L tye ey ete | SDie Loatinzatt Methocrotegy : { + SPLE He cx enetioctetagqy for Phe tesin asd Peng hernaniteion oy, an Bo sprreation Arpier in An evaanimation , + Thi methodology ds a format Approach, ae & problem based 07 a | Atria) tequence OF, Procedures, ; | + Qpre Com oy & Plascs: wo Zoyesriqartion To's ia. rode Arnpovtant phase et begins ust An examination of Me eveqk pr plan, that initictes the ' process. During vais Bhase, Mae objectives , Consrraints & Atope of, tae project We Aprcifed Ak tae Conetudion 4 Pays phase, a ' peastetlary analysis te Perjormet, Lobtch oases Yae economic, bechntcar e behavioral pastoi ites op he procs @ ersitres hat i i { Acopumentation is worth ve org aning tion's Bene & export. {I Arabepsic: Ee begins volt Phe injormation Pima during the investigation’ Please! ‘Te condi gy anesemen Capastity oy the orqanination: Vie .sratis ©) Curent Systems, ana the —— to Atéppovt the Proposes Svisterns « \ + Anakysto begin My Atbarnintrs what The new system in eocpectta te de, & how it wit forevact with scdiating system - 2 This Plrase, 2rcls witty Pie Apcumenteilion Oy, yas, yenaenas Zan nivel. Hank aaih bob, anolipsis. : fi) Logteat design: + Do this phase, fopforrabinn Jotnest frdm oy aalysle phase He Used So Fagin’ Creatin Seton por a bistness —prebiem. a eyetons Based O1 Me bustness eed , appiteations ane selected Drat Are Capable oy Provicting SESE sr mw needed Atrvicrs. + Based 00 the appt cations Needed, data Aupport & Structures capawde Op Provicting Dre needed dinpite 4 Phen chosen. «In, thie phase, ocabiysts gensnae a aumber- “Oy aAltanatine Avluons | ent with correapeneline atrengtn & Utakrerns & cost and benistts. 2 At Une end ny Uhis prose, another peasibilit analysis ig Perjorracd » iy) Phupstaat! deat: + Tn this Phowe, apectpic bechinglarytis We Aerated be support te solutions cteueloped in Bae hogical design. o The Aelictad Components awe Aruakd based on A make ~ ove busy Ceciston : eFteal duaigns éoteqrati various | components Gnd bechnotagis: v) Troplernent ation ; +Tin this Prove, aor Meeded | SO5tLoore ly Crean. o Components Arne ovctered, Teceited @ bested. = Afterwards, users ME trained & SHERRY documentation. reared - + Once alt’ the Coroponente ‘ane tested Bodtvidua od rey axe wstatted & bested as A Arpstern- Agen Oo peastiitiny Onabyds ls Prepared ond Une Spoor On. then PYesented LOvbh Tae system fev a Performance “Yeviews & acceptance best: vi) Maintenance & range: \ a | ' Tt is Mat Longest And most eatpensina prose op Pie process. ~Ir comms Of the tele Necessary & Aupprt ome rrodify the

You might also like