security management and tools
TRANSCRIPT
SECURITY MANAGEMENT INTRODUCTION AND TOOLS
By: PARAG YEVAGE
ROLL NO : 49
Index :
What is security management? Goals of security management. Tools for security management. Encryption. Firewall. E-mail Monitoring. Biometric Disaster Recovery.
What is security management?
set of functions that protects telecommunications networks
systems from unauthorized access by persons, acts, or influences
such as creating, deleting, and controlling security services
controlling the distribution of cryptographic keying material; and authorizing subscriber access, rights, and privileges.
Defination:
The protection of information assets from unauthorized disclosure, modification or destruction by either accidental or intentional means.
Goals Of Security Management:
Accuracy, integrity and safety of information system activities and resources.
Controls can minimize errors, fraud and destruction in the internet worked information systems that interconnect today’s end users and organizations.
Quality assurance for information systems.
Encryption Firewalls
Tools
Disaster Recovery E-mail Monitory
Encryption :
“In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.”
Encryption Process :
Need Of Encryption :
Keep confidential information safe Prevent exposure of information while in transit across an unsecure medium
Prevent exposure of information when a storage device is lost or stolen
Oregon Identity Theft Protection Act (Senate Bill 583) “safe harbor”
Firewalls :
Device to protect networks
Software & hardware format
Based upon a set of rules
Working Of Firewall :
E-mail Monitoring :
Employee use of electronic mail (e-mail) during business hours is a common characteristic of the 21st century workplace.
According to a recent study, over 130 million workers are currently flooding recipients with 2.8 billion e-mail messages each day.
Employers provide e-mail services to their employees as an efficient means of facilitating both intra-company communication and communication with the outside client base.
Security Services for E-mails :
Privacy Authentication Integrity Non-repudiation Proof of delivery Audit
Biometric Security :
Biometric it is high technology security system which relies on detailed measurements of the human body.
Biometric control devices use special purpose sensors to measure and digitize biometric profile of an individuals fingerprints, voice of other physical trait.
Such as :- Fingerprint Facial recognition Hand geometry Iris scan Retina scan DNA Speech recognition Signature recognition
Disaster Recovery :
There are different threats are include such as hurricanes, earthquake, tsunami, lightning, fires, floods, criminal and terrorist acts and human error can an severely damage an organization’s computing resources.
Therefore, organizations develop disaster recovery procedures and formalize them in disaster recovery plan.
Disaster Management :
Identify your resources. Identify your risk. Recovery Strategies.
Thank you