Beruflich Dokumente
Kultur Dokumente
Introduction
Amit Goyal
Need Of Information Security
Hackers Attack
n
eeBay Account ret atio m
its ew c
Adm
n N -Zee News NASA Sitess Se form fro my
n
Ma king i s Hacked In olen Ar Of
c
Ha k Tim
e Mar 25,2005 St dian es
-Computer m
Y o r
C
In Ti
NB h e
S World -T dia 6
-- M 04 Information 2 00
8 ,20 Apr,24,2005 In
25
,
Ja n Hacked by a n
militant from Ja
DRDO.
es
-The Hindu
s t i gat g
inve otin
May25,2006 CBI at e-v
k Space
hac ware
so f t information
k hacked from
j Ta
-Aa 006 ISRO
2 5 , 2
Nov --Hindustan
Times
Amit Goyal Dec 24,2006
Present Scenario
Amit Goyal
Information Security
Amit Goyal
Standard Output Reports &
Suitability To The Industry
Amit Goyal
Indian Scenario:
83% of Indian
businesses reported a
security breach.
Amit Goyal
Nature of Incidents
Defacing
Unknown
Unauthorized
Web Site
Confidential
Compromise
Virus/Malicious
Service
Access
info.
Code
2004 Global+
Amit Goyal 2002-03
Method Of Attack
OS Vulne rability
Unk now n
0 10 20 30 40 50 60
2004
Amit Goyal Global+ 2002-03
Who does it?
Hack e rs Or Te rrorist
Cure nt Em ploye e s
Form e r Em ployee s
Othe rs
Se rvice Provide rs
Com pe titors
Cus tom e rs
Suppliers
0 10 20 30 40 50 60 70
2004 Global+
Amit Goyal 2002-03
Actions Taken To Improve Information
Security In Business
Amit Goyal
Description Of Information
Security
Amit Goyal
Information Security Architecture
Amit Goyal
Create Input For
Prevention
Deterrent Mechanisms Detective Methods
Reactive Measures
Incident Response Procedures
Computer Forensics
Service Restoration
Amit Goyal
Legal Action,System Modification
Information Classification
Amit Goyal
Information Security Challenges
Amit Goyal
Information Security Solutions
Amit Goyal
Types Of Information Security
Amit Goyal
Types Of Information Security
Physical Security
Environmental Security
Personal Security
Amit Goyal
Common Security Threats & Vulnerabilities
Threat:
Any person, object, or event that, if realized, can potentially
cause damage to the network or networked device
Vulnerability:
A weakness in a host or network that can be exploited by a
threat
Amit Goyal
Common Threats
Unauthorized Intrusions
Website Defacements
Internal Attacks
Amit Goyal
Unauthorized Intrusions
e.g.
Destroying a computer's hard disk
Severing the physical infrastructure
Using up all available system resource - CPU,
memory,disk space
Consuming network bandwidth to the server
Amit Goyal
Viruses & Worms
Amit Goyal
Trojans (Backdoors)
Trojans (Backdoors) -
Executable codes installed
that enable entry
into the infected host
without authorization
Amit Goyal
Website Defacements
Amit Goyal
Internal Attacks
Amit Goyal
Other Common Attacks
Smurf attack
Amit Goyal
Vulnerabilities
Social engineering
Amit Goyal
Security Principles
Amit Goyal
Security Principles
Amit Goyal
Tools For Information Security
Amit Goyal
Tools For Information Security
Passwords
Bio-Metrics
Smart Cards
Token devices
Firewalls
Cryptographic Tools
Digital Signatures
Digital Certificate
Amit Goyal
Firewall
Amit Goyal
Firewall
Data Data
Data
Data
Data
Data
Data
Amit Goyal
Types Of Firewall
Amit Goyal
Bio-Metrics
Amit Goyal
Bio-Metrics
Face
Recognition
System
Multiscale Feature
Head Search Search
Face
Wrap Wrap
Masking And
Contrasrt
Norm
Detection
And
Alignmen
t
Amit Goyal
Bio-Metrics
Face Recognition
System Coder
Recognition
Eigenspace
System ID
Projection
Recognition And
Coding
Amit Goyal
Basics OF Cryptography
Encryption
Decryptio
n
Amit Goyal
Digital Signature
Private Key
Public Key
Message Message
Text Cipher Text
Signature Encryption
Text Decryption
Signature
Amit Goyal
Secure Socket Layer
Amit Goyal
Secure Electronic Transaction
Electronic Certificate
Amit Goyal
Hardware & Software Requirement &
Maintenance
Hardware:
Router
Firewall
Nessus
Hping2
SPIKE Proxy
Shadow Security Scanner
Solar Winds Toolsets
Firewalk
Software :
Systems SW : Operating systems
Applications
Firewall
Amit Goyal
Developers Of Security Tools
Amit Goyal
Developers Of Security Tools
Amit Goyal
Conclusion
Amit Goyal
Amit Goyal