Разделы презентаций


Key Principles of Security

Jump Start AgendaModule 1: Today’s Threat LandscapeModule 2: Key Principles of SecurityModule 3: Understanding your enemy!Module 4: Phases of HackersLunch BreakModule 5: What motivates hackers?Module 6: Pass the HashModule

Слайды и текст этой презентации

Слайд 1Key Principles of Security

Key Principles of Security

Слайд 2 Jump Start Agenda
Module 1: Today’s Threat Landscape
Module 2:

Key Principles of Security
Module 3: Understanding your enemy!
Module 4: Phases

of Hackers
Lunch Break
Module 5: What motivates hackers?
Module 6: Pass the Hash
Module 7: Windows Security Capabilities and Tools
Jump Start AgendaModule 1: Today’s Threat LandscapeModule 2: Key Principles of SecurityModule 3: Understanding your

Слайд 3Module Insights
Explore the key concepts of IT Security with strong

focus on ISO2700x.

Module InsightsExplore the key concepts of IT Security with strong focus on ISO2700x.

Слайд 4Not hard to guess but…

Not hard to guess but…

Слайд 5Understand Risk Management

Understand Risk Management

Слайд 6First key principle of security is that no network is

completely secure

Information security is really about risk management

The more

important the asset is and the more it is exposed to security threats, the more resources you should put into securing it

Golden Rules

First key principle of security is that no network is completely secure Information security is really about

Слайд 7[ISO 27001:2005, Clause 3.1]
Define elements of value
Asset

[ISO 27001:2005, Clause 3.1]Define elements of valueAsset

Слайд 8[ISO 27001:2005, Clause 3.1]
Identification of Assets
A possible classification

[ISO 27001:2005, Clause 3.1]Identification of AssetsA possible classification

Слайд 9Threat, Vulnerabilities and Information Security
Threat
Potential cause of an unwanted incident,

which may result in harm to a system or organization

Vulnerability
Weakness

of an asset or group of assets that can be exploited by one or more threats

Information Security
Protection of information from a wide range of threats, in order to ensure business continuity, minimize business risk, and maximize return on investment and business opportunities.

[ISO 27001:2005]

Threat, Vulnerabilities and Information SecurityThreatPotential cause of an unwanted incident, which may result in harm to a

Слайд 10Confidentiality, Integrity and Availability
Confidentiality
The property that information is not made

available or disclosed to unauthorized individuals, entities, or processes

Integrity
The property

of safeguarding the accuracy and completeness of assets

Availability
The property of being accessible and usable upon demand by an authorized entity

[ISO 27001:2005]

Confidentiality, Integrity and AvailabilityConfidentialityThe property that information is not made available or disclosed to unauthorized individuals, entities,

Слайд 11[ISO 27005– 8.2.1]

[ISO 27005– 8.2.1]

Слайд 12Monitor the assets
Once the actions defined in the risk management

plan have been implemented, you will need to monitor the

assets for realization of the security risks
Monitor the assetsOnce the actions defined in the risk management plan have been implemented, you will need

Слайд 13Track changes to risks
As time progresses, changes to your

organization’s hardware, software, personnel, and business processes will add and

obsolete security risks. Similarly, threats to assets and vulnerabilities will evolve and increase in sophistication.
Track changes to risks As time progresses, changes to your organization’s hardware, software, personnel, and business processes

Слайд 14Risk Mgmt. Strategies

Risk Mgmt. Strategies

Слайд 15Security Principles

Security Principles

Слайд 16Key Takeaways

Key Takeaways

Слайд 17@ErdalOzkaya
@MiladPFE
Connect with the speakers!
http://erdalozkaya.com/
https://www.facebook.com/milad.aslaner

@ErdalOzkaya@MiladPFEConnect with the speakers!http://erdalozkaya.com/https://www.facebook.com/milad.aslaner

Слайд 18Deep technical content and free product evaluations
Hands-on deep technical labs
Free,

online, technical courses
Download Microsoft software trials today.
Find Hand On Labs.
Take

a free online course.

Technet.microsoft.com/evalcenter

Technet.microsoft.com/virtuallabs

microsoftvirtualacademy.com

At the TechNet Evaluation Center you can download free, trial versions of Microsoft software, with no feature limits. Dozens of trials are available – all at no cost.
Try Windows Server 2012 for up to 180 days. Download the Windows 8 Enterprise 90-day evaluation. Or try Windows Azure at no-cost for up to 90 days.

Microsoft Hands On Labs offer virtual environments that will take you through guided, technically deep product learning experience.
Learn at your own pace in labs that you can complete in 90 minutes or less. There is no complex setup or installation is required to use TechNet Virtual Labs.

Microsoft Virtual Academy provides free online training on the IT scenarios that are important to your company and your career.
Learn at your own pace and boost your IT skills with over 100 courses across more than 15 Microsoft technologies including Windows Server, Windows 8, Windows Azure, Office 365, virtualization, Windows Phone, and more.

TechNet Virtual Labs

Deep technical content and free product evaluationsHands-on deep technical labsFree, online,  technical coursesDownload Microsoft software trials

Обратная связь

Если не удалось найти и скачать доклад-презентацию, Вы можете заказать его на нашем сайте. Мы постараемся найти нужный Вам материал и отправим по электронной почте. Не стесняйтесь обращаться к нам, если у вас возникли вопросы или пожелания:

Email: Нажмите что бы посмотреть 

Что такое TheSlide.ru?

Это сайт презентации, докладов, проектов в PowerPoint. Здесь удобно  хранить и делиться своими презентациями с другими пользователями.


Для правообладателей

Яндекс.Метрика