You are on page 1of 32

IT

INFRASTRUCTURE
SECURITY

Sachin Sathe
Harshad sathaye

1.

TRANSITION
HEADLINE

Lets start with


the first set of
slides

AGENDA
IT Infrasstructure in CBS
Security Principle
Security Controls
Physical Security
Logical Security
Network Security
Next Generation Devices
E Channels
Risk Assessment
Metigating Risks

IT INFRASTRUCTURE CBS

Physical Security

BIG CONCEPT
Bring the attention of your audience over a key
concept using icons or illustrations

YOU CAN ALSO SPLIT YOUR CONTENT

White
Is the color of milk and
fresh snow, the color
produced by the
combination of all the
colors of the visible
spectrum.

Black
Is the color of coal,
ebony, and of outer
space. It is the darkest
color, the result of the
absence of or complete
absorption of light.

IN TWO OR THREE COLUMNS

Yellow
Is the color of gold,
butter and ripe
lemons. In the
spectrum of visible
light, yellow is
found between
green and orange.

Blue
Is the colour of the
clear sky and the
deep sea. It is
located between
violet and green on
the optical
spectrum.

Red
Is the color of
blood, and because
of this it has
historically been
associated with
sacrifice, danger
and courage.

A PICTURE IS WORTH A
THOUSAND WORDS

A complex idea can be


conveyed with just a single
still image, namely making it
possible to absorb large
amounts of data quickly.

WANT BIG IMPACT?

Use big
image.

WHITE

USE CHARTS TO
EXPLAIN YOUR
IDEAS

GRAY

BLACK

OR USE DIAGRAMS TO EXPLAIN COMPLEX IDEAS

Sample Text
Sample Text

Sample Text

Sample Text

Diagram featured by
http://slidemodel.co
m

AND TABLES TO COMPARE DATA

Yellow

10

20

Blue

30

15

10

24

16

Orange

our
office

MAPS

89,526,1
Whoa! Thats a big number, arent you proud?

89,526,124$
Thats a lot of money

185,244 users
And a lot of users

100%
Total success!

First

Second

Last
OUR PROCESS
IS EASY

LETS REVIEW SOME CONCEPTS


Yellow
Is the color of gold, butter
and ripe lemons. In the
spectrum of visible light,
yellow is found between
green and orange.

Blue
Is the colour of the clear sky
and the deep sea. It is
located between violet and
green on the optical
spectrum.

Red
Is the color of blood, and
because of this it has
historically been associated
with sacrifice, danger and
courage.

Yellow
Is the color of gold, butter
and ripe lemons. In the
spectrum of visible light,
yellow is found between
green and orange.

Blue
Is the colour of the clear sky
and the deep sea. It is
located between violet and
green on the optical
spectrum.

Red
Is the color of blood, and
because of this it has
historically been associated
with sacrifice, danger and
courage.

You can copy&paste graphs from Google Sheets

ANDROID PROJECT

Show and explain your web,


app or software projects
using these gadget
templates.

Place your screenshot


here

IPHONE PROJECT

Show and explain your web,


app or software projects
using these gadget
templates.

Place your screenshot


here

TABLET PROJECT

Show and explain your web,


app or software projects
using these gadget
templates.

Place your screenshot here

DESKTOP PROJECT
Place your screenshot here

Show and explain


your web, app or
software projects
using these gadget
templates.

THANKS!

Any questions?
You can find me at @username &
user@mail.me

Metigating Risks
Balance Protection With Utility
Computers in an office could be completely protected if all themodemswere
torn out and everyone was kicked out of the room - but then they wouldnt be
of use to anyone. This is why one of the biggest challenges in IT security is
finding a balance between resource availability and the confidentiality and
integrity of the resources.
Rather than trying to protect against all kinds of threats, most IT departments
focus on insulating the most vital systems first and then finding acceptable
ways to protect the rest without making them useless. Some of the lowerpriority systems may be candidates for automated analysis, so that the most
important systems remain the focus.
Split up the Users and Resources
For aninformation securitysystem to work, it must know who is allowed to see
and do particular things. Someone in accounting, for example, doesnt need to
see all the names in a client database, but he might need to see the figures
coming out of sales. This means that a system administrator needs to assign
access by a persons job type, and may need to further refine those limits
according to organizational separations. This will ensure that the chief financial
officer will ideally be able to access more data and resources than a junior
accountant.
That said, rank doesnt mean full access. A company's CEO may need to see
more data than other individuals, but he doesnt automatically need full access
to the system. This brings us to the next point.

Metigating Risks
Assign Minimum Privileges
An individual should be assigned theminimum privilegesneeded
to carry out his or her responsibilities. If a persons responsibilities
change, so will the privileges. Assigning minimum privileges
reduces the chances that Joe from design will walk out the door with
all the marketing data.

Metigating Risks
Use Independent Defenses
This is a military principle as much as an IT security one. Using one
really good defense, such as authentication protocols, is only good
until someone breaches it. When several independent defenses
are employed, an attacker must use several different strategies to
get through them. Introducing this type of complexity doesnt
provide 100 percent protection against attacks, but it does reduce
the chances of a successful attack.
Plan for Failure
Planning for failure will help minimize its actual consequences
should it occur. Having backup systems in place beforehand allows
the IT department to constantly monitor security measures and
react quickly to a breach. If the breach is not serious, the business
or organization can keep operating on backup while the problem is
addressed. IT security is as much about limiting the damage from
breaches as it is about preventing them.

Metigating Risks
Record, Record, Record
Ideally, a security system will never be breached, but when a
security breach does take place, the event should be recorded. In
fact, IT staff often record as much as they can, even when a
breach isn't happening. Sometimes the causes of breaches arent
apparent after the fact, so it's important to have data to track
backwards. Data from breaches will eventually help to improve the
system and prevent future attacks - even if it doesnt initially make
sense.
Run Frequent Tests
Hackersare constantly improving their craft, which means
information security must evolve to keep up. IT professionals run
tests, conduct risk assessments, reread the disaster recovery plan,
check thebusiness continuity planin case of attack, and then do it
all over again.

You dont need to keep


this slide in your
presentation. Its only
here to serve you as a
design guide if you need
to create new slides or
download the fonts to
edit the presentation in
PowerPoint

SlidesCarnival icons are editable


shapes.
This means that you can:
Resize them without losing quality.
Change line color, width and style.
Isnt that nice? :)
Examples: