Разделы презентаций


Lecture #9

Содержание

Information RevolutionInformation Revolution as pervasive at the Industrial RevolutionImpact is Political, Economic, and Social as well as TechnicalInformation has an increasing intrinsic valueProtection of critical information now a critical concern in

Слайды и текст этой презентации

Слайд 1Lecture #9


Cybersafety.
Security risks of information, classification. Measures and means of

information protection. Standards and specification in ICT field. Digital signature.


Lecture #9Cybersafety.Security risks of information, classification. Measures and means of information protection. Standards and specification in ICT

Слайд 2Information Revolution
Information Revolution as pervasive at the Industrial Revolution
Impact is

Political, Economic, and Social as well as Technical
Information has an

increasing intrinsic value
Protection of critical information now a critical concern in Government, Business, Academia
Information RevolutionInformation Revolution as pervasive at the Industrial RevolutionImpact is Political, Economic, and Social as well as

Слайд 3Why is Security Difficult
Managers unaware of value of computing resources


Damage to public image
Legal definitions often vague or non-existent
Legal prosecution

is difficult
Many subtle technical issues
Why is Security DifficultManagers unaware of value of computing resources Damage to public imageLegal definitions often vague

Слайд 4Objectives of Security
Privacy – Information only available to authorized users
Integrity

– Information retains intended content and semantics
Availability – Information retains

access and presence
Importance of these is shifting, depends on organization
Objectives of SecurityPrivacy – Information only available to authorized usersIntegrity – Information retains intended content and semanticsAvailability

Слайд 5Security Terms
Exposure - “actual harm or possible harm”
Vulnerability - “weakness

that may be exploited”
Attack - “human originated perpetration”
Threat -

“potential for exposure”
Control - “preventative measure”
Security TermsExposure - “actual harm or possible harm”Vulnerability - “weakness that may be exploited” Attack - “human

Слайд 6Classes of Threat
Interception
Modification
Masquerade
Interruption

Most Security Problems Are People Related

Classes of ThreatInterceptionModificationMasqueradeInterruptionMost Security Problems Are People Related

Слайд 7Software Security Concerns
Theft
Modification
Deletion
Misplacement

Software Security ConcernsTheftModificationDeletionMisplacement

Слайд 8Data Security Concerns
Vector for attack
Modification
Disclosure
Deletion

Data Security ConcernsVector for attackModificationDisclosureDeletion

Слайд 9Network Security Concerns
Basis for Attack
Publicity
Theft of Service
Theft of Information

Network

is only as strong as its weakest link
Problems multiply with

number of nodes
Network Security ConcernsBasis for AttackPublicity Theft of ServiceTheft of InformationNetwork is only as strong as its weakest

Слайд 10Motivations to Violate Security
Greed
Ego
Curiosity
Revenge
Competition
Political/Idiological

Motivations to Violate SecurityGreedEgoCuriosityRevengeCompetitionPolitical/Idiological

Слайд 11Three Security Disciplines

Physical
Most common security discipline
Protect facilities and contents
Plants, labs,

stores, parking areas, loading areas, warehouses, offices, equipment, machines, tools,

vehicles, products, materials
Personnel
Protect employees, customers, guests
Information
The rest of this course
Three Security DisciplinesPhysicalMost common security disciplineProtect facilities and contentsPlants, labs, stores, parking areas, loading areas, warehouses, offices,

Слайд 12How Has It Changed?
Physical Events Have Cyber Consequences



Cyber Events

Have Physical Consequences

How Has It Changed? Physical Events Have Cyber ConsequencesCyber Events Have Physical Consequences

Слайд 13Why Physical Security?
Not all threats are “cyber threats”
Information

one commodity that can be stolen without being “taken”
Physically

barring access is first line of defense
Forces those concerned to prioritize!
Physical Security can be a deterrent
Security reviews force insights into value of what is being protected
Why Physical Security? Not all threats are “cyber threats” Information one commodity that can be stolen without

Слайд 14Layered Security
Physical Barriers
Fences
Alarms
Restricted Access Technology

Physical Restrictions
Air Gapping
Removable Media
Remote

Storage

Personnel Security Practices
Limited Access
Training
Consequences/Deterrence

Layered Security Physical BarriersFencesAlarmsRestricted Access Technology Physical RestrictionsAir GappingRemovable MediaRemote Storage Personnel Security PracticesLimited AccessTrainingConsequences/Deterrence

Слайд 15Physical Barriers
Hardened Facilities
Fences
Guards
Alarms
Locks
Restricted Access Technologies
Biometrics
Coded Entry
Badging
Signal Blocking (Faraday Cages)

Physical Barriers Hardened FacilitiesFencesGuardsAlarmsLocksRestricted Access TechnologiesBiometricsCoded EntryBadgingSignal Blocking (Faraday Cages)

Слайд 16Outer Protective Layers
Structure
Fencing, gates, other barriers
Environment
Lighting, signs, alarms
Purpose
Define property line

and discourage trespassing
Provide distance from threats

Outer Protective LayersStructureFencing, gates, other barriersEnvironmentLighting, signs, alarmsPurposeDefine property line and discourage trespassingProvide distance from threats

Слайд 17Middle Protective Layers
Structure
Door controls, window controls
Ceiling penetration
Ventilation ducts
Elevator Penthouses
Environment
Within defined

perimeter, positive controls
Purpose
Alert threat, segment protection zones

Middle Protective LayersStructureDoor controls, window controlsCeiling penetrationVentilation ductsElevator PenthousesEnvironmentWithin defined perimeter, positive controlsPurposeAlert threat, segment protection zones

Слайд 18Inner Protective Layers
Several layers
Structure
Door controls, biometrics
Signs, alarms, cctv
Safes, vaults
Environment
Authorized personnel

only
Purpose
Establish controlled areas and rooms
95752:1-

Inner Protective LayersSeveral layersStructureDoor controls, biometricsSigns, alarms, cctvSafes, vaultsEnvironmentAuthorized personnel onlyPurposeEstablish controlled areas and rooms95752:1-

Слайд 19Other Barrier Issues
Handling of trash or scrap
Fire:
Temperature
Smoke
Pollution:
CO
Radon
Flood
Earthquake
95752:1-

Other Barrier IssuesHandling of trash or scrapFire:TemperatureSmokePollution:CORadonFloodEarthquake95752:1-

Слайд 20Physical Restrictions
Air Gapping Data
Limits access to various security levels
Requires

conscious effort to violate
Protects against inadvertent transmission
Removable Media
Removable Hard

Drives
Floppy Disks/CDs/ZIP Disks
Remote Storage of Data
Physically separate storage facility
Use of Storage Media or Stand Alone computers
Updating of Stored Data and regular inventory

95752:1-

Physical Restrictions Air Gapping DataLimits access to various security levelsRequires conscious effort to violateProtects against inadvertent transmission

Слайд 21Methods of Defense
Overlapping controls
Authentication
Encryption
Integrity control
Firewalls
Network configuration
Application configuration
Policy
95752:1-

Methods of DefenseOverlapping controlsAuthenticationEncryptionIntegrity controlFirewallsNetwork configurationApplication configurationPolicy95752:1-

Слайд 22Digital Signature is a process that guarantees that the contents

of a message have not been altered in transit.
When you,

the server, digitally sign a document, you add a one-way hash (encryption) of the message content using your public and private key pair.
Your client can still read it, but the process creates a "signature" that only the server's public key can decrypt. The client, using the server's public key, can then validate the sender as well as the integrity of message contents.
Whether it's
an email
an online order
or a watermarked photograph on eBay
if the transmission arrives but the digital signature does not match the public key in the digital certificate, then the client knows that the message has been altered.

Digital Signature is a process that guarantees that the contents of a message have not been altered

Слайд 23How does a Digital Signature Work?
The digital signature can be

considered as a numerical value that is represented as a

sequence of characters. The creation of a digital signature is a complex mathematical process that can only be created by a computer.

How do I create a Digital Signature?
You can obtain a digital signature from a reputable certificate authority such as Comodo, or you can create it yourself. You need a digital certificate to digitally sign a document. However, if you create and use a self-signed certificate the recipients of your documents will not be able to verify the authenticity of your digital signature. They will have to manually trust your self-signed certificate.
Types of digital signatures
How does a Digital Signature Work?The digital signature can be considered as a numerical value that is

Слайд 24Online Safety

Online Safety

Слайд 25Rules to know
Protect your privacy
Protect your password
Protect the privacy of

others
Beware of contests, clubs, prizes, & gifts
Beware of strangers
Don’t break

the law
Practice Netiquette
Rules to knowProtect your privacyProtect your passwordProtect the privacy of othersBeware of contests, clubs, prizes, & giftsBeware

Слайд 26Protect your privacy
People that you meet online are strangers
Never tell

anyone private information about yourself
Don’t use your real name -

invent a nickname*
Protect your privacyPeople that you meet online are strangersNever tell anyone private information about yourselfDon’t use your

Слайд 27Protect your privacy 2
Don’t give out your address or phone

number
Don’t tell your age or where you go to school
Don’t

tell where or when you’re going on vacation
Never send your picture
Protect your privacy 2Don’t give out your address or phone numberDon’t tell your age or where you

Слайд 28Protect your password
Passwords should be very private
Don’t tell them to

anyone, not even your best friend
Don’t use something obvious:
Name
Address
Phone number
Birthday
BE

UNIQUE
Change your password often
Protect your passwordPasswords should be very privateDon’t tell them to anyone, not even your best friendDon’t use

Слайд 29Protect the privacy of others
Never give out private information about

your family or friends
Never tell anyone where your parents work
Never

give private numbers to anyone
Protect the privacy of othersNever give out private information about your family or friendsNever tell anyone where

Слайд 30Protect the privacy of others 2
Never tell anyone the real

names of your friends or where they live
Never enter the

email or text files of anyone else without permission
Protect the privacy of others 2Never tell anyone the real names of your friends or where they

Слайд 31Beware of contests and…
Check with a trusted adult before…
Entering a

contest
Joining a club
Accepting a prize or gift
Purchasing anything
Creating a myspace

or other social networking account
You could be sharing private information without meaning to.
Beware of contests and…Check with a trusted adult before…Entering a contestJoining a clubAccepting a prize or giftPurchasing

Слайд 32Why do they need to know?

Register to “use” this site
Just

because they ask doesn’t mean you have to tell

Why do they need  to know?Register to “use” this siteJust because they ask doesn’t mean you

Слайд 33Beware of Strangers
People you meet online are always strangers!
Never agree

to meet with a stranger in person
Never agree to speak

on the phone
Beware of StrangersPeople you meet online are always strangers!Never agree to meet with a stranger in personNever

Слайд 34Beware of Strangers 2
Never send your picture
Never let anyone send

a picture to you
If a stranger is asking you to

meet them, to call them or to send a picture, DON’T WAIT--Tell a parent right away!
Beware of Strangers 2Never send your pictureNever let anyone send a picture to youIf a stranger is

Слайд 35Don’t break the law
Never let anyone talk you into breaking

the law
Never send hateful or threatening email
Never use someone else’s

passwords
Don’t break the lawNever let anyone talk you into breaking the lawNever send hateful or threatening emailNever

Слайд 36Don’t break the law 2
Never try to access other computers
Never

copy and use commercial software or music files

Don’t break the law 2Never try to access other computersNever copy and use commercial software or music

Слайд 37Practice “Netiquette”
Treat others with courtesy and respect
Don’t use nasty language
Don’t

be cruel

Practice “Netiquette”Treat others with courtesy and respectDon’t use nasty languageDon’t be cruel

Слайд 38Practice “Netiquette” 2
Don’t spread rumors or lies
Don’t SHOUT
Don’t hold down

the enter key when you’re not sending a message

Practice “Netiquette” 2Don’t spread rumors or liesDon’t SHOUTDon’t hold down the enter key when you’re not sending

Слайд 39Choose a screen name wisely
Don’t use one that indicates “boy”

or “girl”
Don’t use one that has sexual or drug related

connotations. If you “know” what it means, then it’s a sure thing that someone else will too.
Choose a screen name wiselyDon’t use one that indicates “boy” or “girl”Don’t use one that has sexual

Слайд 40Other “Stuff”
Never answer a message that makes you feel uncomfortable

or bad
Show weird messages to a parent or adult right

away
Don’t get suckered into a “cyberfight”
Remember, you always have the power to leave
Other “Stuff”Never answer a message that makes you feel uncomfortable or badShow weird messages to a parent

Обратная связь

Если не удалось найти и скачать доклад-презентацию, Вы можете заказать его на нашем сайте. Мы постараемся найти нужный Вам материал и отправим по электронной почте. Не стесняйтесь обращаться к нам, если у вас возникли вопросы или пожелания:

Email: Нажмите что бы посмотреть 

Что такое TheSlide.ru?

Это сайт презентации, докладов, проектов в PowerPoint. Здесь удобно  хранить и делиться своими презентациями с другими пользователями.


Для правообладателей

Яндекс.Метрика