Download - Security management and tools
![Page 1: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/1.jpg)
SECURITY MANAGEMENT INTRODUCTION AND TOOLS
By: PARAG YEVAGE
ROLL NO : 49
![Page 2: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/2.jpg)
Index :
What is security management? Goals of security management. Tools for security management. Encryption. Firewall. E-mail Monitoring. Biometric Disaster Recovery.
![Page 3: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/3.jpg)
What is security management?
set of functions that protects telecommunications networks
systems from unauthorized access by persons, acts, or influences
such as creating, deleting, and controlling security services
controlling the distribution of cryptographic keying material; and authorizing subscriber access, rights, and privileges.
![Page 4: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/4.jpg)
Defination:
The protection of information assets from unauthorized disclosure, modification or destruction by either accidental or intentional means.
![Page 5: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/5.jpg)
Goals Of Security Management:
Accuracy, integrity and safety of information system activities and resources.
Controls can minimize errors, fraud and destruction in the internet worked information systems that interconnect today’s end users and organizations.
Quality assurance for information systems.
![Page 6: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/6.jpg)
Encryption Firewalls
Tools
Disaster Recovery E-mail Monitory
![Page 7: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/7.jpg)
Encryption :
“In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.”
![Page 8: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/8.jpg)
Encryption Process :
![Page 9: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/9.jpg)
Need Of Encryption :
Keep confidential information safe Prevent exposure of information while in transit across an unsecure medium
Prevent exposure of information when a storage device is lost or stolen
Oregon Identity Theft Protection Act (Senate Bill 583) “safe harbor”
![Page 10: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/10.jpg)
Firewalls :
Device to protect networks
Software & hardware format
Based upon a set of rules
![Page 11: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/11.jpg)
Working Of Firewall :
![Page 12: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/12.jpg)
E-mail Monitoring :
Employee use of electronic mail (e-mail) during business hours is a common characteristic of the 21st century workplace.
According to a recent study, over 130 million workers are currently flooding recipients with 2.8 billion e-mail messages each day.
Employers provide e-mail services to their employees as an efficient means of facilitating both intra-company communication and communication with the outside client base.
![Page 13: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/13.jpg)
Security Services for E-mails :
Privacy Authentication Integrity Non-repudiation Proof of delivery Audit
![Page 14: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/14.jpg)
Biometric Security :
Biometric it is high technology security system which relies on detailed measurements of the human body.
Biometric control devices use special purpose sensors to measure and digitize biometric profile of an individuals fingerprints, voice of other physical trait.
![Page 15: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/15.jpg)
Such as :- Fingerprint Facial recognition Hand geometry Iris scan Retina scan DNA Speech recognition Signature recognition
![Page 16: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/16.jpg)
Disaster Recovery :
There are different threats are include such as hurricanes, earthquake, tsunami, lightning, fires, floods, criminal and terrorist acts and human error can an severely damage an organization’s computing resources.
Therefore, organizations develop disaster recovery procedures and formalize them in disaster recovery plan.
![Page 17: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/17.jpg)
Disaster Management :
Identify your resources. Identify your risk. Recovery Strategies.
![Page 18: Security management and tools](https://reader034.vdocuments.mx/reader034/viewer/2022042815/557852bbd8b42a2f6a8b4f7e/html5/thumbnails/18.jpg)
Thank you