Beruflich Dokumente
Kultur Dokumente
Agenda
IS Security Managerial Techniques Security Threats and Technologies Tips to mitigate risk of security threats
Security Technologies Companies and research organizations continue to develop and refine technologies to prevent security breaches. Some Include: Firewalls Biometrics VPN and Encryption
IS Security: Technology
Firewalls A system of software, hardware or both designed to detect intrusion and prevent unauthorized access to or from a private network
Firewall Techniques Packet Filter examine each packet entering and leaving network and accept/reject based on rules Application Level Control Performs certain security measures based on a specific application (e.g. file transfer) Circuit Level Control detects certain types of connections or circuits on either side of the firewall
Prevention Steps: AntiVirus software: install this software which is designed to block all known viruses and offers automatic or manual updates to virus patterns to block future viruses No Disk Sharing Viruses can be transferred to clean computers by inserting disks containing infected files Delete Suspicious Email Messages Do not open suspicious e-mail messagesDelete Only! Report Viruses If you get a virus, report it to you network administrator immediately!
Viruses/Worms
Software programs designed to invade your computer, and copy, damage or delete your data
Trojan Horses
Viruses that pretend to be programs that help you while destroying your data and damaging your computer
Spyware
Software that secretly watches and records your online activities or send you endless pop-up ads
Use technology to reduce nuisances, and report security incidents when appropriate