Professional Documents
Culture Documents
Challenges of IT
OBJECTIVES
Information Security
Impact of IT on Health
In Governance
Stages Of E-Governance
Stage I:
Web Presence
Stage II:
Interactive
Presence
Stage III:
Transactional
Presence
Since we are always in contact with computers and smart phones it is important
to know what provokes health issues and how to prevent them.
8/20/16
1.Eye-Strain
2.Back and Neck ache
3.Repetitive Strain Injury(RSI)
4.Ozone irritation
Cyber-sickness:
8/20/16
Social implications
access to harmful information which corrupts peoples minds
and drives them to commit crime.
use of search engines to find information on how to create
harmful weapons ,how to commit wrong acts in society.
PLAGIARISM
Information Security
information
security
Preserving authorized
restrictions on access
and disclosure,
including means for
protecting personal
privacy and proprietary
information
What is it
for
protecting
information and
information systems
from
unauthorized
access,
use,
disclosure,
disruption,
modification, or
destruction
Ensuring
timely and
reliable
access to and
use of
information.
Confidentiality
Information
Security
Availability
Guarding against
improper
information
modification or
destruction, and
includes ensuring
information nonrepudiation and
authenticity;
Integrity
Security
Aligning
IT with
Business
Value/Cost
Keeping
IT Running
Managing
Complexity
Regulatory
Compliance
Competitive advantage
Application Security
Info Security Landscape
Desktop
Transport
Network
Antivirus
Protection
Encryption
(SSL)
Firewalls /
IDS / IPS
Web Applications
Application
Servers
Firewall
Backend
Server
Databases
Web Servers
Motives Behind
Application Hacking
Incidents
Web Hacking
Incidents by Industry
Click
Click icon
icon to
to add
add picture
picture
The
The
Denying
Using
HACKING
The obsessive
use of
computers
The
unauthorized
access and use
of networked
computer
systems
CRACKER
A malicious or criminal
hacker who maintains
knowledge of the
vulnerabilities found
for private advantage
White Hat
Also known as friendly hackers
are always using their
knowledge for good reasons
Black Hat
Grey Hat
Are borderline white/black hats.
They sometimes prank
unsuspecting users and cause
general mayhem. While they think
this kind of activity is harmless,
they may face long periods of jail
time if they ever get found out.
Denial of Service
Scans
Sniffer
Spoofing
Faking an e-mail address or Web page to trick users into passing along critical
information like passwords or credit card numbers
CONT
Trojan House
A program that, unknown to the user, contains instructions that exploit a known
vulnerability in some software
Back Doors
A hidden point of entry to be used in case the original entry point is detected or blocked
Malicious Applets
Tiny Java programs that misuse your computers resources, modify files on the hard disk,
send fake email, or steal passwords
War Dialing
Logic Bombs
CONT
Buffer Overflow
Password Crackers
Social Engineering
Dumpster Diving
CYBER THEFT
Shareware
My Doom,(2004)
PoisonIvy (2005)
Zeus (2007)
agent.btz (2008)
Spyware
Spyware
Captures information about the user and sends it over the Internet
Security Management
The goal of security management is the accuracy, integrity,
and safety of all information system processes and
resources.
Information
System
Controls
Security Measures
Public/Private Key Encryption
Encryption
Data is transmitted
in scrambled form
It is unscrambled
by computer
systems for
authorized users
only
FIREWALLS
A gatekeeper system
that protects a
companys intranets
and other computer
networks from intrusion
Important for
individuals who connect
to the Internet with DSL
or cable modems
Email Monitoring
Virus Defenses
Security Codes
Encrypted passwords
Backup Files
Biometrics
Preventive maintenance
Server
System
Identification
of critical Systems
Critical Systems
ERP System
HISTORY
Justice
CYBER LAW
Cyber law is the law governing the cyber space.
Also called Law of Internet.
Cyberspace is a very wide term and includes computers,
networks, software, data storage devices,Internet, websites,
emails,electronic devices such as cell phones, ATM machines
Cyber law of India encompasses laws relating to:
1. Cyber Crimes
2. Electronic and Digital Signatures
3. Intellectual Property
4. Data Protection and Privacy.
CYBER CRIME
Cyber crimes are unlawful acts where computer is used
either as a tool or a target or both.
The enormous growth in electronic commerce (ecommerce) and online share trading has led to a
phenomenal increase in incidents of cybercrime.
Cyber crimes can be basically divided into 3 categories:
1. Cybercrimes against persons
2. Cybercrimes against property
3. Cyber crimes against government
INTELLECTUAL PROPERTY
Intellectual property refers to creations of human minds.
It is the result of creativity such as patents, copyrights etc.
Electronic signature
E- signatures are used to authenticate electronic records.
Also called Digital signatures.
Digital signatures satisfy 3 major legal requirements:
1.Signer authentication
2.Message authentication
3.Message integrity
8/20/16
CASE STUDY