SlideShare a Scribd company logo
Md.Jamal Uddin
Information Security and Backup System
Basicsof InformationSystem
Data: raw facts – Alphanumeric, image, audio, and video
Information: collection of facts organized in such a way that they have
additional value beyond the value of the facts themselves
An Information System(IS) is a set of interrelated components that
collect or retrieve, process, store and distribute information to support
decision making and control in an organization.
Basicsof InformationSystem
Processing/manipulation
Input/output
Control
Storage
Today Information Systems are mostly computerized, and software based.
The major functions of an IS are-
WhyInformation Security???
Web site defacement
Use of IT across
businesses
Theft of confidential data
Fast growth of Internet
Financial Frauds
Commercialization of
Internet
 Data Scavenging
 Shoulder Surfing
 Piggy Backing
 Man In the middle
 Social Engineering
 Buffer overruns
 SQL injections Cookies
 Cross Site Scripting (XSS)
 SPAM
 Denial Of Service (DOS)/ DDOS
 Virus / Worms/ Trojans
 Spyware / Adware
 Phishing
 Spoofing
Cybercrime
Cyber Crime Techniques
Confidentiality
It is the principle that information will not be
disclosed to unauthorized subjects.
Examples: Unauthorized network data sniffing
Listening a phone conversation.
Integrity
It is the protection of system
information or process from intentional
or accidental unauthorized changes.
Availability
It defines that information or resources
are available when required.
02
01 03
Three basic elements of Information Security.
OtherElementsofInfoSec
Identification recognition of an entity by a system.
Authentication Process of verifying identity.
Accountability Tracing activities of individual on a system.
Authorization Granting access or other permissions.
Privacy
Right of individual to control the sharing of
information about him.
HowtoachieveInformationSecurity???
1 3
Information Security does
not mean only installing
antivirus and firewalls.
Information assets are those resources
that store, transport, create, use or are
information.
2
Information security tends
to protect hardware,
software, data,
procedures, records,
supplies and human
resources.
HowtoachieveInformation
Security???
Policies, standards,
procedures, guidelines,
employee screening,
change control, Security
awareness trainings.
Access controls,
encryption, Firewalls, IDS,
IPS,HTTPS
controlled physical access
to resources, monitoring,
no USB or CDROM etc.
Administrative
Controls
Technical
Controls
Physical
Controls
 Always use official software.
 Keep all software up to date with patches.
 If using free software always download from original developers site.
 Do not disclose all your information on internet sites like
orkut/Facebook.
 Use Internet with control.
 Use email properly.
 Take care while discarding your waste material.
 Use small gadgets carefully as information storage.
 Be careful while surfing from a cybercafe
SomeGoodHabits
Threat
A threat is a possible event that can damage or harm an
Information System.
Vulnerability
It is the weakness within a system. It is the degree of exposure in view of threat.
Countermeasures
It is a set of actions implemented to prevent threats.
Information System Security
Information System Security
Computer Viruses
A code that performs malicious act.
Can insert itself into other programs in a system.
Worm is a virus that can replicate itself to other systems using network.
Biggest threat to personal computing.
Trojan Horse
A program that performs malicious or unauthorizedacts.
Distributed as a good program.
May be hidden within a good program.
Information System Security
Denial of Service (DoS)
Making system unavailable to legitimate users.
Impersonation
Assuming someone else’s identity and enjoying his privileges.
Salami Technique
Diverting small amount of money from a large number of accounts maintained
by the system.
Small amounts go unnoticed.
Spoofing
Configuring a computer to assume some other computers identity.
Information System Security
Scavenging
Unauthorized access to information by searching through the remains
after a job is finished.
Dumpster diving
Data Leakage
Various techniques are used to obtain stored data
SQL injection
Error Outputs
Wiretapping
Tapping computer transmission lines to obtain data.
Theft of Mobile Devices
Information System Security
Myths, rumors and hoaxes
Created by sending false emails to as many people as possible.
These may have significant impact on companies, their reputation and
business.
Web Site Attacks
Web site defacement
Adding wrong information
Increase in cyber crime rates
Organized cyber criminals
Information System Security
Employee Issues
Disgruntle Employees
Availability of hacking tools
Social Engineering Attacks
Sharing Passwords
Sharing Official Systems
Not following clean desk policy
Rise in Mobile workers
Use mobile devices
Wireless access
Lots of organization data exposed
Building Blocks of Information Security
Basic Terms and Definitions
Encryption
Modification of data for security reasons prior to their transmissions so that it is
not comprehensible without the decoding method.
Cipher
Cryptographic transformation that operates on characters or bits of data.
Cryptanalysis
Methods to break the cipher so that encrypted message can be read.
Caesar Cipher in Cryptography
The Caesar Cipher technique is one of the earliest and simplest method of
encryption technique. It’s simply a type of substitution cipher, i.e., each
letter of a given text is replaced by a letter some fixed number of positions
down the alphabet. For example with a shift of 1, A would be replaced by
B, B would become C, and so on.
Text : ABCDEFGHIJKLMNOPQRSTUVWXYZ
Shift: 23
Cipher: XYZABCDEFGHIJKLMNOPQRSTUVW
Text : ATTACKATONCE
Shift: 4
Cipher: EXXEGOEXSRGI
Building Blocks of Information Security
Electronic Signature
Process that operates on a message to assure message source authenticity, integrity
and non-repudiation.
Non-Repudiation
Methods by which the transmitted data is tagged with sender’s identity as a proof so
neither can deny the transmission.
Steganography
Method of hiding the existence of data. The bit map images are regularly used to
transmit hidden messages.
Data Backup and
Disaster Recovery
What is Backup?
 Backup – is a duplicate copy of key information
such physical (paper) and computer records.
 A good set of back procedures is necessary to ensure
that data is protected.
What is Backup?
 Data that should be backed up regularly includes, but is not
limited to
 email correspondence, audit files, user information, utilities
and applications, operating systems, financial data and
databases, as well as customer lists.
Types of Media Backup
 Tape Drives
 Tape drivers can range in capacity from a few
megabytes to hundreds of gigabytes.
 Disk Drives
 Disk drives offers high speed but expensive
backup media.
Types of Media Backup
 Removable Disks
 Removable drives are fast, easy to install and
portable.
Types of Media Backup
Types of Backup Media (cont’d)
 Digital Audio Tape
 DAT drives have a larger capacity as
compared to standard tape drive.
Types ofBackupMedia (cont’d)
 Optical Jukeboxes
 Optical jukebox offer excellent amounts of
secure storage space ranging from 5 to 20
terabytes.
Types of Backup Media (cont’d)
 Autoloader tape systems
 Autoloader tape systems use a magazine of tapes to create
extended backup volumes.
 It is recommended for businesses that needs very high capacity.
Factors in Choosing Backup Media
 Factors to consider in selecting an appropriate backup
solution:
 Speed
 It refers to how fast data can be backed upand
recovered.
 Reliability
 It refers to the reliability of the backup serviceand media.
Factors in Choosing Backup Media
 Capacity
 It refers to the amount of data to backup giventhe time and resource constraints.
 Extensibility
 It refers to the ability of the backup solutionto
address the current needs of theorganization
 Cost
 It refers to the cost of the backup solution and it
should conform to the budgetavailability.
Backup Tips
 Provide a point person to perform rollback in the case of an
emergency.
 Keep a record of the contents of the backup media and date of
backup.
Always verify backup.
 Create a restore point.
Backup Tips
 Encrypt and provide high permission on the
backup file.
 Create a detailed guideline on backup
recovery.
Access Control - Physical
• Follow Security Procedures
• Wear Identity Cards and Badges
• Ask unauthorized visitor his credentials
• Attend visitors in Reception and Conference Room only
• Bring visitors in operations area without prior
permission
• Bring hazardous and combustible material in secure
area
• Practice ―Piggybacking‖
• Bring and use pen drives, zip drives, ipods, other storage devices unless and
otherwise authorized to do so
Password Guidelines
 Always use at least 8 character password with combination of
alphabets, numbers and special characters (*, %, @, #, $, ^)
 Use passwords that can be easily remembered by you
 Change password regularly as per policy
 Use password that is significantly different from earlier passwords
 Use passwords which reveals your personal
information or words found in dictionary
 Write down or Store passwords
 Share passwords over phone or Email
 Use passwords which do not match above complexity criteria
 Do not access internet through dial-up connectivity
 Do not use internet for viewing, storing or transmitting
obscene or pornographic material
 Do not use internet for accessing auction sites
 Do not use internet for hacking other computer systems
 Do not use internet to download / upload commercial
software / copyrighted material
 Use internet services for business purposes only
Internet Usage
E-mail Usage
 Do not use official ID for any personal subscription purpose
 Do not send unsolicited mails of any type like chain letters or
E-mail Hoax
 Do not send mails to client unless you are authorized to do so
 Do not post non-business related information to large
number of users
 Do not open the mail or attachment which is suspected to be virus or
received from an unidentified sender
Use official mail for business purposes only
Follow the mail storage guidelines to avoid blocking of E-mails
 If you come across any junk / spam mail, do the following
a) Remove the mail.
b) Inform the security help desk
c) Inform the same to server administrator
d) Inform the sender that such mails are undesired
Human Wall Is Always Better Than A Firewall
Cybersecurity Tools
Penetration testing tools
Kali Linux
Metasploit
Password auditing and packet sniffers
cybersecurity tools
Cain and Abel
Wireshark
John the Ripper
Tcpdump
Cybersecurity tools for network defense
Netstumbler
Aircrack-ng
KisMAC
Tools for scanning web vulnerabilities
Nmap
Nikto
Nexpose
Paros Proxy
Burp Suite
Nessus Professional
Cybersecurity Tools
Encryption cybersecurity tools
TrueCrypt
KeyPass
Tor
Tools for monitoring network security
POf
Argus
Nagios
OSSEC
Cybersecurity tools for detecting network
intrusions
Snort
Acunetix
Forcepoint
GFI LanGuard
Most Dangerous New Malware
Clop Ransomware
Fake Updates
Zeus Gameover
News Malware Attacks
Social Engineering
AI Attacks
Cryptojacking
Freeware
RaaS
IoT Device Attacks
Md.Jamal Uddin
Con/Whatsapp:01814840483
Email:Engrjamal22@gmail.Com
Fb:Engrmdjamaluddin22
Information Security and Backup System
Thank
You
Ad

Recommended

End User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai
 
InformationSecurity
InformationSecurity
learnt
 
End-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
Information security awareness - 101
Information security awareness - 101
mateenzero
 
Physical security
Physical security
Dhani Ahmad
 
Basic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
 
Information Security Awareness
Information Security Awareness
Net at Work
 
Security Awareness Training
Security Awareness Training
William Mann
 
Cyber security training
Cyber security training
Wilmington University
 
1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
Introduction to information security
Introduction to information security
jayashri kolekar
 
Cyber security awareness
Cyber security awareness
Jason Murray
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum
 
New Hire Information Security Awareness
New Hire Information Security Awareness
hubbargf
 
The CIA triad.pptx
The CIA triad.pptx
GulnurAzat
 
Customer information security awareness training
Customer information security awareness training
AbdalrhmanTHassan
 
Social engineering
Social engineering
Vîñàý Pãtêl
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
Ahmed Musaad
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
Cybersecurity Employee Training
Cybersecurity Employee Training
Paige Rasid
 
Information Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Android Malware Detection Mechanisms
Android Malware Detection Mechanisms
Talha Kabakus
 
Cyber Security Best Practices
Cyber Security Best Practices
Evolve IP
 
Human resources security
Human resources security
CAS
 
Physical security.ppt
Physical security.ppt
Faheem Ul Hasan
 
Social engineering
Social engineering
Vishal Kumar
 
ICT and end user security awareness slides
ICT and end user security awareness slides
jubke
 
Data Security
Data Security
AkNirojan
 
information security awareness course
information security awareness course
Abdul Manaf Vellakodath
 
3e - Computer Crime
3e - Computer Crime
MISY
 

More Related Content

What's hot (20)

Cyber security training
Cyber security training
Wilmington University
 
1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
Introduction to information security
Introduction to information security
jayashri kolekar
 
Cyber security awareness
Cyber security awareness
Jason Murray
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum
 
New Hire Information Security Awareness
New Hire Information Security Awareness
hubbargf
 
The CIA triad.pptx
The CIA triad.pptx
GulnurAzat
 
Customer information security awareness training
Customer information security awareness training
AbdalrhmanTHassan
 
Social engineering
Social engineering
Vîñàý Pãtêl
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
Ahmed Musaad
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
Cybersecurity Employee Training
Cybersecurity Employee Training
Paige Rasid
 
Information Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Android Malware Detection Mechanisms
Android Malware Detection Mechanisms
Talha Kabakus
 
Cyber Security Best Practices
Cyber Security Best Practices
Evolve IP
 
Human resources security
Human resources security
CAS
 
Physical security.ppt
Physical security.ppt
Faheem Ul Hasan
 
Social engineering
Social engineering
Vishal Kumar
 
ICT and end user security awareness slides
ICT and end user security awareness slides
jubke
 
Data Security
Data Security
AkNirojan
 
1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
Introduction to information security
Introduction to information security
jayashri kolekar
 
Cyber security awareness
Cyber security awareness
Jason Murray
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum
 
New Hire Information Security Awareness
New Hire Information Security Awareness
hubbargf
 
The CIA triad.pptx
The CIA triad.pptx
GulnurAzat
 
Customer information security awareness training
Customer information security awareness training
AbdalrhmanTHassan
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
Ahmed Musaad
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
Cybersecurity Employee Training
Cybersecurity Employee Training
Paige Rasid
 
Information Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Android Malware Detection Mechanisms
Android Malware Detection Mechanisms
Talha Kabakus
 
Cyber Security Best Practices
Cyber Security Best Practices
Evolve IP
 
Human resources security
Human resources security
CAS
 
Social engineering
Social engineering
Vishal Kumar
 
ICT and end user security awareness slides
ICT and end user security awareness slides
jubke
 
Data Security
Data Security
AkNirojan
 

Similar to information security and backup system (20)

information security awareness course
information security awareness course
Abdul Manaf Vellakodath
 
3e - Computer Crime
3e - Computer Crime
MISY
 
3e - Security And Privacy
3e - Security And Privacy
MISY
 
Internet safety and you
Internet safety and you
Art Ocain
 
Rothke Sia 2006
Rothke Sia 2006
Ben Rothke
 
Dos and Dont to be followed to protect information and technology
Dos and Dont to be followed to protect information and technology
ssuser3baba2
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
Jan Wong
 
1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Find Powerful Methods To Fight Against Cyber Threats?
Find Powerful Methods To Fight Against Cyber Threats?
VRS Technologies
 
Technical seminar on Security
Technical seminar on Security
STS
 
End user security awareness
End user security awareness
Kanishk Raj
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Information Security Seminar
Information Security Seminar
Acend Corporate Learning
 
Data security
Data security
AbdulBasit938
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
CabdullhiY
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
Rodrigo Piovesana
 
Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 
3e - Computer Crime
3e - Computer Crime
MISY
 
3e - Security And Privacy
3e - Security And Privacy
MISY
 
Internet safety and you
Internet safety and you
Art Ocain
 
Rothke Sia 2006
Rothke Sia 2006
Ben Rothke
 
Dos and Dont to be followed to protect information and technology
Dos and Dont to be followed to protect information and technology
ssuser3baba2
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
Jan Wong
 
1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Find Powerful Methods To Fight Against Cyber Threats?
Find Powerful Methods To Fight Against Cyber Threats?
VRS Technologies
 
Technical seminar on Security
Technical seminar on Security
STS
 
End user security awareness
End user security awareness
Kanishk Raj
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
CabdullhiY
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
Rodrigo Piovesana
 
Ad

More from Engr. Md. Jamal Uddin Rayhan (15)

DESCO AE CSE Question Solution
DESCO AE CSE Question Solution
Engr. Md. Jamal Uddin Rayhan
 
OSI Model Cheat Sheet
OSI Model Cheat Sheet
Engr. Md. Jamal Uddin Rayhan
 
Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.
Engr. Md. Jamal Uddin Rayhan
 
Assistant Programmer, Bangladesh Bank
Assistant Programmer, Bangladesh Bank
Engr. Md. Jamal Uddin Rayhan
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Engr. Md. Jamal Uddin Rayhan
 
Senior Officer , Pubali Bank Limited
Senior Officer , Pubali Bank Limited
Engr. Md. Jamal Uddin Rayhan
 
Bangladesh telecommunication regulatory commision
Bangladesh telecommunication regulatory commision
Engr. Md. Jamal Uddin Rayhan
 
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Engr. Md. Jamal Uddin Rayhan
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
Engr. Md. Jamal Uddin Rayhan
 
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
Engr. Md. Jamal Uddin Rayhan
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Engr. Md. Jamal Uddin Rayhan
 
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Engr. Md. Jamal Uddin Rayhan
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
Engr. Md. Jamal Uddin Rayhan
 
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Engr. Md. Jamal Uddin Rayhan
 
Titas gas sub-assistant engineer question pattern
Titas gas sub-assistant engineer question pattern
Engr. Md. Jamal Uddin Rayhan
 
Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.
Engr. Md. Jamal Uddin Rayhan
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Engr. Md. Jamal Uddin Rayhan
 
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Engr. Md. Jamal Uddin Rayhan
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
Engr. Md. Jamal Uddin Rayhan
 
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
Engr. Md. Jamal Uddin Rayhan
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Engr. Md. Jamal Uddin Rayhan
 
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Engr. Md. Jamal Uddin Rayhan
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
Engr. Md. Jamal Uddin Rayhan
 
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Engr. Md. Jamal Uddin Rayhan
 
Ad

Recently uploaded (20)

M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
Q1_TLE 8_Week 1- Day 1 tools and equipment
Q1_TLE 8_Week 1- Day 1 tools and equipment
clairenotado3
 
Vitamin and Nutritional Deficiencies.pptx
Vitamin and Nutritional Deficiencies.pptx
Vishal Chanalia
 
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
IIT Kharagpur Quiz Club
 
Aprendendo Arquitetura Framework Salesforce - Dia 02
Aprendendo Arquitetura Framework Salesforce - Dia 02
Mauricio Alexandre Silva
 
How payment terms are configured in Odoo 18
How payment terms are configured in Odoo 18
Celine George
 
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
Ronisha Das
 
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Rajdeep Bavaliya
 
Birnagar High School Platinum Jubilee Quiz.pptx
Birnagar High School Platinum Jubilee Quiz.pptx
Sourav Kr Podder
 
Gladiolous Cultivation practices by AKL.pdf
Gladiolous Cultivation practices by AKL.pdf
kushallamichhame
 
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
 
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
How to Manage Different Customer Addresses in Odoo 18 Accounting
How to Manage Different Customer Addresses in Odoo 18 Accounting
Celine George
 
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
Kweku Zurek
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Rajdeep Bavaliya
 
This is why students from these 44 institutions have not received National Se...
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
sumadsadjelly121997
 
LDMMIA Shop & Student News Summer Solstice 25
LDMMIA Shop & Student News Summer Solstice 25
LDM & Mia eStudios
 
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
Q1_TLE 8_Week 1- Day 1 tools and equipment
Q1_TLE 8_Week 1- Day 1 tools and equipment
clairenotado3
 
Vitamin and Nutritional Deficiencies.pptx
Vitamin and Nutritional Deficiencies.pptx
Vishal Chanalia
 
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
IIT Kharagpur Quiz Club
 
Aprendendo Arquitetura Framework Salesforce - Dia 02
Aprendendo Arquitetura Framework Salesforce - Dia 02
Mauricio Alexandre Silva
 
How payment terms are configured in Odoo 18
How payment terms are configured in Odoo 18
Celine George
 
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
Ronisha Das
 
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Rajdeep Bavaliya
 
Birnagar High School Platinum Jubilee Quiz.pptx
Birnagar High School Platinum Jubilee Quiz.pptx
Sourav Kr Podder
 
Gladiolous Cultivation practices by AKL.pdf
Gladiolous Cultivation practices by AKL.pdf
kushallamichhame
 
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
 
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
How to Manage Different Customer Addresses in Odoo 18 Accounting
How to Manage Different Customer Addresses in Odoo 18 Accounting
Celine George
 
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
Kweku Zurek
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Rajdeep Bavaliya
 
This is why students from these 44 institutions have not received National Se...
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
sumadsadjelly121997
 
LDMMIA Shop & Student News Summer Solstice 25
LDMMIA Shop & Student News Summer Solstice 25
LDM & Mia eStudios
 

information security and backup system

  • 2. Basicsof InformationSystem Data: raw facts – Alphanumeric, image, audio, and video Information: collection of facts organized in such a way that they have additional value beyond the value of the facts themselves An Information System(IS) is a set of interrelated components that collect or retrieve, process, store and distribute information to support decision making and control in an organization.
  • 3. Basicsof InformationSystem Processing/manipulation Input/output Control Storage Today Information Systems are mostly computerized, and software based. The major functions of an IS are-
  • 4. WhyInformation Security??? Web site defacement Use of IT across businesses Theft of confidential data Fast growth of Internet Financial Frauds Commercialization of Internet
  • 5.  Data Scavenging  Shoulder Surfing  Piggy Backing  Man In the middle  Social Engineering  Buffer overruns  SQL injections Cookies  Cross Site Scripting (XSS)  SPAM  Denial Of Service (DOS)/ DDOS  Virus / Worms/ Trojans  Spyware / Adware  Phishing  Spoofing Cybercrime Cyber Crime Techniques
  • 6. Confidentiality It is the principle that information will not be disclosed to unauthorized subjects. Examples: Unauthorized network data sniffing Listening a phone conversation. Integrity It is the protection of system information or process from intentional or accidental unauthorized changes. Availability It defines that information or resources are available when required. 02 01 03 Three basic elements of Information Security.
  • 7. OtherElementsofInfoSec Identification recognition of an entity by a system. Authentication Process of verifying identity. Accountability Tracing activities of individual on a system. Authorization Granting access or other permissions. Privacy Right of individual to control the sharing of information about him.
  • 8. HowtoachieveInformationSecurity??? 1 3 Information Security does not mean only installing antivirus and firewalls. Information assets are those resources that store, transport, create, use or are information. 2 Information security tends to protect hardware, software, data, procedures, records, supplies and human resources.
  • 9. HowtoachieveInformation Security??? Policies, standards, procedures, guidelines, employee screening, change control, Security awareness trainings. Access controls, encryption, Firewalls, IDS, IPS,HTTPS controlled physical access to resources, monitoring, no USB or CDROM etc. Administrative Controls Technical Controls Physical Controls
  • 10.  Always use official software.  Keep all software up to date with patches.  If using free software always download from original developers site.  Do not disclose all your information on internet sites like orkut/Facebook.  Use Internet with control.  Use email properly.  Take care while discarding your waste material.  Use small gadgets carefully as information storage.  Be careful while surfing from a cybercafe SomeGoodHabits
  • 11. Threat A threat is a possible event that can damage or harm an Information System. Vulnerability It is the weakness within a system. It is the degree of exposure in view of threat. Countermeasures It is a set of actions implemented to prevent threats. Information System Security
  • 12. Information System Security Computer Viruses A code that performs malicious act. Can insert itself into other programs in a system. Worm is a virus that can replicate itself to other systems using network. Biggest threat to personal computing. Trojan Horse A program that performs malicious or unauthorizedacts. Distributed as a good program. May be hidden within a good program.
  • 13. Information System Security Denial of Service (DoS) Making system unavailable to legitimate users. Impersonation Assuming someone else’s identity and enjoying his privileges. Salami Technique Diverting small amount of money from a large number of accounts maintained by the system. Small amounts go unnoticed. Spoofing Configuring a computer to assume some other computers identity.
  • 14. Information System Security Scavenging Unauthorized access to information by searching through the remains after a job is finished. Dumpster diving Data Leakage Various techniques are used to obtain stored data SQL injection Error Outputs Wiretapping Tapping computer transmission lines to obtain data. Theft of Mobile Devices
  • 15. Information System Security Myths, rumors and hoaxes Created by sending false emails to as many people as possible. These may have significant impact on companies, their reputation and business. Web Site Attacks Web site defacement Adding wrong information Increase in cyber crime rates Organized cyber criminals
  • 16. Information System Security Employee Issues Disgruntle Employees Availability of hacking tools Social Engineering Attacks Sharing Passwords Sharing Official Systems Not following clean desk policy Rise in Mobile workers Use mobile devices Wireless access Lots of organization data exposed
  • 17. Building Blocks of Information Security Basic Terms and Definitions Encryption Modification of data for security reasons prior to their transmissions so that it is not comprehensible without the decoding method. Cipher Cryptographic transformation that operates on characters or bits of data. Cryptanalysis Methods to break the cipher so that encrypted message can be read.
  • 18. Caesar Cipher in Cryptography The Caesar Cipher technique is one of the earliest and simplest method of encryption technique. It’s simply a type of substitution cipher, i.e., each letter of a given text is replaced by a letter some fixed number of positions down the alphabet. For example with a shift of 1, A would be replaced by B, B would become C, and so on. Text : ABCDEFGHIJKLMNOPQRSTUVWXYZ Shift: 23 Cipher: XYZABCDEFGHIJKLMNOPQRSTUVW Text : ATTACKATONCE Shift: 4 Cipher: EXXEGOEXSRGI
  • 19. Building Blocks of Information Security Electronic Signature Process that operates on a message to assure message source authenticity, integrity and non-repudiation. Non-Repudiation Methods by which the transmitted data is tagged with sender’s identity as a proof so neither can deny the transmission. Steganography Method of hiding the existence of data. The bit map images are regularly used to transmit hidden messages.
  • 21. What is Backup?  Backup – is a duplicate copy of key information such physical (paper) and computer records.  A good set of back procedures is necessary to ensure that data is protected.
  • 22. What is Backup?  Data that should be backed up regularly includes, but is not limited to  email correspondence, audit files, user information, utilities and applications, operating systems, financial data and databases, as well as customer lists.
  • 23. Types of Media Backup  Tape Drives  Tape drivers can range in capacity from a few megabytes to hundreds of gigabytes.
  • 24.  Disk Drives  Disk drives offers high speed but expensive backup media. Types of Media Backup
  • 25.  Removable Disks  Removable drives are fast, easy to install and portable. Types of Media Backup
  • 26. Types of Backup Media (cont’d)  Digital Audio Tape  DAT drives have a larger capacity as compared to standard tape drive.
  • 27. Types ofBackupMedia (cont’d)  Optical Jukeboxes  Optical jukebox offer excellent amounts of secure storage space ranging from 5 to 20 terabytes.
  • 28. Types of Backup Media (cont’d)  Autoloader tape systems  Autoloader tape systems use a magazine of tapes to create extended backup volumes.  It is recommended for businesses that needs very high capacity.
  • 29. Factors in Choosing Backup Media  Factors to consider in selecting an appropriate backup solution:  Speed  It refers to how fast data can be backed upand recovered.  Reliability  It refers to the reliability of the backup serviceand media.
  • 30. Factors in Choosing Backup Media  Capacity  It refers to the amount of data to backup giventhe time and resource constraints.  Extensibility  It refers to the ability of the backup solutionto address the current needs of theorganization  Cost  It refers to the cost of the backup solution and it should conform to the budgetavailability.
  • 31. Backup Tips  Provide a point person to perform rollback in the case of an emergency.  Keep a record of the contents of the backup media and date of backup. Always verify backup.  Create a restore point.
  • 32. Backup Tips  Encrypt and provide high permission on the backup file.  Create a detailed guideline on backup recovery.
  • 33. Access Control - Physical • Follow Security Procedures • Wear Identity Cards and Badges • Ask unauthorized visitor his credentials • Attend visitors in Reception and Conference Room only • Bring visitors in operations area without prior permission • Bring hazardous and combustible material in secure area • Practice ―Piggybacking‖ • Bring and use pen drives, zip drives, ipods, other storage devices unless and otherwise authorized to do so
  • 34. Password Guidelines  Always use at least 8 character password with combination of alphabets, numbers and special characters (*, %, @, #, $, ^)  Use passwords that can be easily remembered by you  Change password regularly as per policy  Use password that is significantly different from earlier passwords  Use passwords which reveals your personal information or words found in dictionary  Write down or Store passwords  Share passwords over phone or Email  Use passwords which do not match above complexity criteria
  • 35.  Do not access internet through dial-up connectivity  Do not use internet for viewing, storing or transmitting obscene or pornographic material  Do not use internet for accessing auction sites  Do not use internet for hacking other computer systems  Do not use internet to download / upload commercial software / copyrighted material  Use internet services for business purposes only Internet Usage
  • 36. E-mail Usage  Do not use official ID for any personal subscription purpose  Do not send unsolicited mails of any type like chain letters or E-mail Hoax  Do not send mails to client unless you are authorized to do so  Do not post non-business related information to large number of users  Do not open the mail or attachment which is suspected to be virus or received from an unidentified sender Use official mail for business purposes only Follow the mail storage guidelines to avoid blocking of E-mails  If you come across any junk / spam mail, do the following a) Remove the mail. b) Inform the security help desk c) Inform the same to server administrator d) Inform the sender that such mails are undesired
  • 37. Human Wall Is Always Better Than A Firewall
  • 38. Cybersecurity Tools Penetration testing tools Kali Linux Metasploit Password auditing and packet sniffers cybersecurity tools Cain and Abel Wireshark John the Ripper Tcpdump Cybersecurity tools for network defense Netstumbler Aircrack-ng KisMAC Tools for scanning web vulnerabilities Nmap Nikto Nexpose Paros Proxy Burp Suite Nessus Professional
  • 39. Cybersecurity Tools Encryption cybersecurity tools TrueCrypt KeyPass Tor Tools for monitoring network security POf Argus Nagios OSSEC Cybersecurity tools for detecting network intrusions Snort Acunetix Forcepoint GFI LanGuard
  • 40. Most Dangerous New Malware Clop Ransomware Fake Updates Zeus Gameover News Malware Attacks Social Engineering AI Attacks Cryptojacking Freeware RaaS IoT Device Attacks