Top Banner
© Copyright 1997, The University of New Mexico The University of New Mexico Top School in Noida By: School.edhole.com
26

Top schools in noida

Nov 17, 2014

Download

Education

Edhole.com

Edhole School provides best Information about Schools in India, Delhi, Noida, Gurgaon. Here you will get about the school, contact, career, etc. Edhole Provides best study material for school students.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 1. The University of New MexicoTop School in Noida Copyright 1997, The University of New MexicoBy:School.edhole.com

2. The University of New Mexico Copyright 1997, The University of New MexicoI-2Security Fundamentals What is security? Why do I need security? Levels of security Some scenarios Security PolicySchool.edhole.com 3. The University of New Mexico Copyright 1997, The University of New MexicoI-3What is Security? Procedures that protect you, your employees, and your peers Paper or electronic media Hardware, software, and networks Protect from damage, theft, or changeSchool.edhole.com 4. The University of New Mexico Copyright 1997, The University of New MexicoI-4What is Security? Protect assets and resources against Human error Intruders from outside Dishonest employees Technical sabotageSchool.edhole.com 5. The University of New Mexico Copyright 1997, The University of New MexicoI-5Why do I Need Security? Typical bank robbery: $9000 Typical embezzlement or white collar crime:$25,000 Typical electronic crime: $650,000School.edhole.com 6. The University of New Mexico Copyright 1997, The University of New MexicoI-6Why do I Need Security? Name a company, its been broken into What does this cost a year? (Estimate $5 billion) 17% of US companies had losses due to lack ofsecurity CERT reports a 77% increase in computer break-insfrom 1994-1995 It is estimated that 85%-97% of computerintrusions go undetected School.edhole.com 7. The University of New Mexico Copyright 1997, The University of New MexicoI-7Why do I Need Security? Statistics (Who is breaking into you) Current employees 81% Former employees 6% Outsiders 13%School.edhole.com 8. The University of New Mexico Copyright 1997, The University of New MexicoI-8Why do I Need Security? Statistics (What are they doing) Alteration of information 12% Theft of service 10% Trespass 2% Money theft 44% Theft of information 16% Damage to software 16%School.edhole.com 9. The University of New Mexico Copyright 1997, The University of New MexicoI-9Why do I Need Security? Statistics (Damage to data) Dishonest employees 10% Terrorism 3% Technical sabotage 10% Water 10% Fire 15% Human error 55%School.edhole.com 10. The University of New Mexico Copyright 1997, The University of New MexicoI-10Why do I Need Security? The growth of the internet and client/serverapplications has moved more business data ontothe network. This means more to lose if that datais tampered with or stolen. Internetworking is great for data sharing butdecreases security.School.edhole.com 11. The University of New Mexico Copyright 1997, The University of New MexicoI-11Why do I Need Security? Protect yourself from an attack on your account ornetwork Protect others from being attacked by your accountor network Disaster recoverySchool.edhole.com 12. The University of New Mexico Copyright 1997, The University of New MexicoI-12Levels of Security The United States Department of Defense hasdefined 7 levels of computer OS security in adocument known as the Trusted ComputerStandards Evaluation Criteria. The levels are used to define different levels ofprotection for hardware, software, and storedinformation. The system is additive - higher ratings include theSfucnhcotoiol.neadlihtyo loef. cthoem levels below. 13. The University of New Mexico Copyright 1997, The University of New MexicoI-13Levels of Security D1 is the lowest form of security available andstates that the system is untrusted A D1 rating is never awarded because this isessentially no security at allSchool.edhole.com 14. The University of New Mexico Copyright 1997, The University of New MexicoI-14Levels of Security C1 is the lowest level of security. The system has file and directory read and writecontrols and authentication through user login.However, root is considered an unsecure functionand auditing (system logging) is not available. Most Unix machines would be classified as C1.School.edhole.com 15. The University of New Mexico Copyright 1997, The University of New MexicoI-15Levels of Security C2 features an auditing function to record allsecurity-related events and provides strongerprotection on key system files, such as thepassword file. Most Unix machines have the capability withaddition of software to become C2 compliant.School.edhole.com 16. The University of New Mexico Copyright 1997, The University of New MexicoI-16Levels of Security B1 supports multi-level security, such as secret andtop secret, and mandatory access control, whichstates that a user cannot change permissions onfiles or directories B2 requires that every object and file be labeledaccording to its security level and that these labelschange dynamically depending on what is beingused.School.edhole.com 17. The University of New Mexico Copyright 1997, The University of New MexicoI-17Levels of Security B3 extends security levels down into the systemhardware; for example, terminals can only connectthrough trusted cable paths and specialized systemhardware to ensure there is no unauthorized access A1 is the highest level of security validatedthrough the Orange Book. The design must bemathematically verified; all hardware and softwaremust have been protected during shipment toSpcrehvoeonlt. etadmhpoeleri.ncgo.m 18. The University of New Mexico Copyright 1997, The University of New MexicoI-18Types of Attacks? A fire burned in an office. The fire destroyed allsoftware, the computer, and most of the files. Theoffice was that of the departmental administratorwho did grades, budgets, and contract functions. Prevention? What to do?School.edhole.com 19. The University of New Mexico Copyright 1997, The University of New MexicoI-19Disaster Recovery Plan Backup policy Steps to be taken when you have a disaster Contact namesSchool.edhole.com 20. The University of New Mexico Copyright 1997, The University of New MexicoI-20Disaster Recovery (Backups) Create a backup policy There are 2 reasons to do backups Recovery of accidentally deleted files Disaster recovery Follow your policy and take backups regularly. Verify these backups at some interval. Keep backups off-siteSchool.edhole.com 21. The University of New Mexico Copyright 1997, The University of New MexicoI-21Backups Purchase good software and hardware for backups Decide on which data to backup and on whatinterval Get a routine Daily, weekly, and monthly Full and IncrementalSchool.edhole.com 22. The University of New MexicoDisaster Recovery (Recovery) What do you do when you have a major disaster? Dont panic Remember you have good backups Follow your plan (You did write up a plan for this Copyright 1997, The University of New MexicoI-22right?)School.edhole.com 23. The University of New Mexico Copyright 1997, The University of New MexicoI-23Types of Attacks? In an open, well traveled, multi-cubicle office youhave financial resource access that you musttransfer to your network departmental computer.How do you perform your work on the mainframe,Novell and your PC while doing other clericalduties that often take you from your desk? Without compromising your data?School.edhole.com 24. The University of New MexicoProtection from Theft or Change Copyright 1997, The University of New MexicoI-24 Risks analysis What are the potential risks? Who wants to see this data? Who wants to change this data? Possible attacks from inside? You must create a security policy!School.edhole.com 25. The University of New MexicoProtection from Theft or Change Copyright 1997, The University of New MexicoI-25 Protect from the public wandering the area Keep good passwords and screen savers withpasswordsSchool.edhole.com 26. The University of New Mexico Copyright 1997, The University of New MexicoI-26Types of Attacks Using commonly accessible hacker tools yourpassword is guessed and somebody uses youraccount to then break into another account. Prevention? What to do?School.edhole.com