Security management and tools

Post on 10-Jun-2015

473 views 3 download

Tags:

Transcript of Security management and tools

SECURITY MANAGEMENT INTRODUCTION AND TOOLS

By: PARAG YEVAGE

ROLL NO : 49

Index :

What is security management? Goals of security management. Tools for security management. Encryption. Firewall. E-mail Monitoring. Biometric Disaster Recovery.

What is security management?

set of functions that protects telecommunications networks

systems from unauthorized access by persons, acts, or influences

such as creating, deleting, and controlling security services

controlling the distribution of cryptographic keying material; and authorizing subscriber access, rights, and privileges.

Defination:

The protection of information assets from unauthorized disclosure, modification or destruction by either accidental or intentional means.

Goals Of Security Management:

Accuracy, integrity and safety of information system activities and resources.

Controls can minimize errors, fraud and destruction in the internet worked information systems that interconnect today’s end users and organizations.

Quality assurance for information systems.

Encryption Firewalls

Tools

Disaster Recovery E-mail Monitory

Encryption :

“In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.”

Encryption Process :

Need Of Encryption :

Keep confidential information safe Prevent exposure of information while in transit across an unsecure medium

Prevent exposure of information when a storage device is lost or stolen

Oregon Identity Theft Protection Act (Senate Bill 583) “safe harbor”

Firewalls :

Device to protect networks

Software & hardware format

Based upon a set of rules

Working Of Firewall :

E-mail Monitoring :

Employee use of electronic mail (e-mail) during business hours is a common characteristic of the 21st century workplace.

According to a recent study, over 130 million workers are currently flooding recipients with 2.8 billion e-mail messages each day.

 Employers provide e-mail services to their employees as an efficient means of facilitating both intra-company communication and communication with the outside client base.

Security Services for E-mails :

Privacy Authentication Integrity Non-repudiation Proof of delivery Audit

Biometric Security :

Biometric it is high technology security system which relies on detailed measurements of the human body.

Biometric control devices use special purpose sensors to measure and digitize biometric profile of an individuals fingerprints, voice of other physical trait.

Such as :- Fingerprint Facial recognition Hand geometry Iris scan Retina scan DNA Speech recognition Signature recognition

Disaster Recovery :

There are different threats are include such as hurricanes, earthquake, tsunami, lightning, fires, floods, criminal and terrorist acts and human error can an severely damage an organization’s computing resources.

Therefore, organizations develop disaster recovery procedures and formalize them in disaster recovery plan.

Disaster Management :

Identify your resources. Identify your risk. Recovery Strategies.

Thank you