Sie sind auf Seite 1von 17

WELCOME TO OUR

PRESENTATION

O ur G roup M em bers
Name

Md. Abdur Rahim


Md. Shahriar Kabir
Md. Asfaquzzaman

ID

BBA-130105009
BBA-130104937
BBA-130104975

Topic

Information Technology security

Introduction
Security is a basic human concept that has

become more difficult to define and enforce in


the Information Age. Information technology
security is often the challenge of balancing the
demands of users versus the need for data
confidentiality and integrity. Information
technology security is the controlling access to
sensitive electronic information so only those
with a legitimate need to access it are allowed
to do so.

What is IT security?
IT security, also known as cyber security

or Computer security, is the protection of


information systems from theft or damage
to the hardware, the software, and to the
information on them, as well as from
disruption or misdirection of the services
they provide.
Information Security is composed of
computer security and communication
security.

Cont
IT Security is the process of protecting

the intellectual property of an


organization.
IT security is a risk management
discipline, whose job is to manage the
cost of information risk to the
business.

Why need IT security?


To prevent theft of or damage to the hardware
To prevent theft of or damage to the

information
To prevent disruption of service
To prevent crackers from accessing a
computer system, computer security
individuals need to block noncritical incoming
ports on the firewalls. Moreover, the ports
remaining open need to be protected by
patching the services utilizing those ports
email, Web services, and FTP.

Goals of IT security
IT security is generally comprised of
five main goals:
Integrity: guaranteeing that the data are
those that they are believed to be
Confidentiality: ensuring that only
authorized individuals have access to the
resources being exchanged

Cont
Availability: guaranteeing the

information system's proper operation


Non-repudiation: guaranteeing that
an operation cannot be denied
Authentication: ensuring that only
authorized individuals have access to
the resources

Issues/Considerations of IT security
Technical Issues of IT Security
Individual Victimization and Damages
Future Developments
Cultural, Sociological, and Political

Implications and Control Issues


Insider threat isn't going away
Cyber attacks, including governmentsponsored, continue; education and
standards prioritized

Cont
Enterprises deploy faster response and

recovery solutions
'Social' the new frontier for cyber crime
DDoS attacks get even bigger but Botnets
stick around
Email is the primary mode of
communication
Online searches are essential
The occasional breach is unavoidable

Cont
Prevent Computer Hacking on an

Organization
Social media a hackers favorite
target

Potential Impact
Positive Impact of IT security in our Society are increasing

knowledge, increasing the use of computer, communications etc.


Negative Impact of Computer in Our Society are restricted

knowledge, hamper in browsing, losing numerical abilities for


depending on computer.
Effects on Technology Organizations
Some other impacts are
Secure web browsing
Secure Data
Secure personal information

Where needs IT security?


Financial systems
Utilities and industrial equipment
Aviation
Consumer devices
Large corporations
Automobiles
Government

Conclusion
As Internet use is developing, more and
more companies are opening their
information system to their partners and
suppliers. Therefore, it is essential to know
which of the company's resources need
protecting and to control system access and
the user rights of the information system.

Das könnte Ihnen auch gefallen