You are on page 1of 8
INFORMATION TECHNOLOGY (cSE323) Information and communication technology (ICT) security mea protect confidential information from unauthori The three k nts OF ai s _ Sgntrolling access to confidential information . 5 : io) system include: | Information and communication technology security © Information and communication technology (ICT) security measures are nec protect confidential information from unauthorised use, modification, loss or © The three key elements of an effective ICT securi i oe + Monitoring and controlling access to confidential information — + Safe transmission of data : + Secure storage and disposal of data Monitoring and controlling access’ to confidential __ information . A fundamental principle of protective security is to ensure access to information that the government holds in trust is on a need-to-know basis only. There are a number of technical security measures that are commonly used to monitor and control access to” -confidential ‘information, in accordance with the requirements of the Australian Government Protective Security Policy Framework. These measures should be applied for all data intégration projects i ing Commonwealth data: « Assignment of unique personal identification code and a secure means of authentication'for system access. « User accounts, access rights and security authorisations managed through an “accountable system or records management process. Protocols that ensure access rights are not shared with or provided to others. Audit trails that include date and user identification to track and monitor access to systems and data and how they are used. Controlmechanisms to prevent unauthorised access, deletion, modification, duplication, printing or transmission of files. » Systems‘maintenance plans that provide adequate ongoing resources for security upgrades. i Safe transmission of ‘data “The safe traismission of data, including source data, linkage keys, as well as Marv's copy 3 * Project specific linkage keys should i i datasets or Bio} ge keys should not enable links to be established with other te jects. The code (algorithm) used to create linkage keys should also ept confidential to. prevent anyone re-identifying records through their Knowledge of the key. + Once the approved purpose of the project. is met, the integrated dataset and Project linkage keys should be destroyed in a way that complies with secure disposal requirements, unless retention of the dataset is required for long-term studies or has otherwise been agreed by data custodians. : Secure disposal of electronic records could include: overwriting records so that the underlying, previously stored data is rendered beyond easy recovery, deletion of back- up files, and for very sensitive information at high risk, degaussing might be considered (this involves demagnetisation using altemating electric currents and renders any previously stored data on the storage media as, unremdable), The recommended form of destruction of paper records or physical media, such as DVDs, is shredding. + Linkage keys that have been created to facilitate future studies involving data linkage, should always be stored separately from the integrated dataset and the source dataset, with appropriate security and authorisation controls. + If integrated datasets are being retained, the reasons for retention as well as storage and disposal arrangements should be well documented in the project agreements, and a review of storage and access process set up. If such retention. ‘was not, part of the initial approval process then the integrating authority must get approval of the decision to retain the dataset from the data custodian(s). This is essential to comply with High Level Principle 6 — Preserving Privacy and Confidentiality. « Where identifiers need to be retained, for example for longitudinal studies, they will be kept separate’ from the integrated dataset and the separation principle observed. The integrating authority is responsible for the integrated dataset and must strictly control access for the life of the data. Infofmation security: The term ‘information security’ means protecting information and information ‘systems from unauthorized access, use,! disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality, and availability. i 6 @® ‘he fundamental principles (tenets) of information security are confidentiality, @) integrity, ang pvalal ity. Every element of an information security program (and : 7 every security control put in place by an entity) should be designed to achieve one or more of these principles, Together, they are called the a. i . ity and ethics is defined as an all encompassing term, that refers ta ceded to secure information and systems Support it in facilitate its ethical use, ... Managerial, organizational and societal implications of information security and ethics are then evaluated, ‘These are explained with their affects as following below: +, Personal Privacy: It is an important aspect of ethical issues in information access right + Harmful Actions: ‘sponsible to ensure that computer technology does not used i YS which can harm people, environment and the society. ... With the ethi e employee directly they can contribute betterifor an organization. a What are the ethics of security 3 These include, ‘courage, tempetance, charity, good feeds, piitie, good ane friendliness, trathfulness, Wittiness, same, and jlistice (Solomon, 1994). The security Officer is expected not only to make ethical decisions but to al: Iso follow a code of ethics. The Security Officer Code of Ethics include ten key elements, importance of ethics among informatéa technology professional is responsible to ensure that computer technologydoes not used in the wrong ways which can harm People, environment and the,society. ... With the ethics of the employee directly they can contribute better ae ae @ Whyis security ethics important Ethics_is the understanding of moral_principles that jovern_human Therefore, a security guard is professional and ethical if they do what Semorally sound andartin the manner you would expecta security guank r uld ex! © Information Technology Trends @ + Cloud Computing. One of the biggest trends that have emerged during the past year is that of cloud computing... / Mobile Apps. ... Big Data Analytics. ... + Automation, ... Artificial Intelligence. + Smart Technology. . + Virtual Reality. ... Augmented Reality. 4 popping @ iuture world, ICT will play a highly important role in convergence of fast computing together-with high-speed communications, and all other smart computational sciences and application ahd ICT also will influence the future world's various areas, including science, engineering, industry, business, law, politics. @ FUNDAMENTAL CONCEPT IN IT SECURITY CPA The included concepts are information asset, confidentiality, integrity, availability, threat, incident, damage, security mechanism, vulnerability and'risk. The concepts and their relations are’modeled graphically in order to increase the understanding of conceptual fundamentals within the arca of information security. @ computer security is the protection of computing systems and the. data that they store or access. * Confidentiality, integrity, non-repudiation, authenticity, and availability. are the elements of security. » Security risk to home users arise from_ various computer attacks . 2 Theshce f tal principles of security are availability, integrity, and confidentiality and are commonly referred to as CIA or AIC triad which also form the main objective of any security program. @ vow information security risks are classified Data and systems are classifi isk i are not considered to be Moder ‘ptigh-Risk, and: The data is intended for public disclosure, or. The|loss of confidentiality, integrity, or availability of the data orsystem would have no adverse impact on our mission, safety, finances, or reputation. n like Software attacks, 4 Hectual fe n Security threats can be many like § eatta theft of intellectua caneety, eon Wentity theft, theft of equipment or inf ny sabotage, and Information — xtortion. : @® Here's a quick look at some of today's most common computer security threats; Malware, Exploits and malware aze increasing through veotors ranging from social networks to mobile. devices to employees themselves. ... 3+ Mobile Threats. ,,, “C+ Threats to Mobile Payments... + Attacks on SMBs, ” + Uneducated Users. . + User Errors, @ Here are the most c: Security threats examples: ————se most common Security threats exam * Computer virus, We've all heard + Rogue Security software. ... + Trojan horse, .. + Adware and spyware, +’ Computer worm, .., * DOS and DDos attack. ... + Phishing, .., A + Rootkit, about them, and we all have our fears. eee 1 | @ SECURITY IDENTIFY THREAT : Threat identification and Sources and vulnerabilities and Sained from threat identificati and response to drive protecti assessment involves discovering knowledge about threat _ analyzing the potential for exploitation, . Information — on and assessment should be Used in risk assessment _ 've and detective strategies and tactics, : l an @® Whatarethe steps after threats are being identified : i The Steps of Threat Analysis a +” Step 1: Identifying Threats, .,, : Steps 2 and 3: Profiling Threats and SECURITY SPAM ANTIVIRUS x afc MN) filter has multiple mechahisms to detect spam and malware because ae me hackers use a variety of techniques to send malicious emails, .. The blocking ead ote {sed to scan email.and attachments should have malicious URL. cking and phishing protection, ®&) What Is spam and antivirus software Spam is-digital junk mail: unsolicited communications sent in bulkover the internet or through any electronic messaging system, Learn what spam Is, how It to detect spam, and how to reduce the.amount.of spam you receive, DOWNLOAD. AVAST FREE ANTIVIRUS, @ Spam is defined as irrelevant messages sent to computer users using the internet as medium with a motive of advertising, phishing or releasing malware. ... Other forms of spams that you may come across include unsolicited messages on instant Messaging, blog comments section, social media posts etc What is spam in security Spat is defined as irrelevant or unsolicited messages sent to a large number of Internet users, for iljegitimate advertising, and.other activities such as phishing, and spreading malware*% Email spam can be used for legitimate purposes such as sharing arsending a message to a large group of people. SECURITY FIREWALL Ga) A firewall is a network security device that' monitors incoming and outgoing network traffic a1 ides whether to allow or block specific traffic based on a defined set of security rules. Firewalls have been a first line of defense in network security for over 25 years. ... Afi be hari OP There ore three Uasic firewalls that are used by companies to protect thei data & devices to keep destructive elements out of network, viz, Packet Filters, Stateful Inspection and Proxy Server Firewalls. Let us give you a brief introductio) about each of these, ~ all's a network security device that monitors ANd litera Ine and outgoing network traffic based on.an organization’ i : : - At its most basic, a firewall is essentially the barrier that sits between a- ate Internal network and the public Internet, . OR 6) a firewall is a “curity firmware or software that forms @ Darfter BeRY EER TER BRAN to allow and block cel Ttaln traffic. it inspects traffic so that it can block threats that might harm your systems «Just like a guard in your gates, a firewall prevents what's. coming in and going out, GD The best ty rewvalls for businesses t Windows Defender or OS X Application Firewall. : Best for solopreneurs. & + Thire-party software firewall, : Best for individuals handling sensitive data. S_ + Firewall & antivirus software. ... < + Basic router, .,, © + Firewall router, 6 + VPN router. ~ Load balancer, .., Unified threat management (UTM) ' IMPO! F FIREWALL © Firew: ide pro ign against outside cyber attackers by shielding yo Sree cbt neiwerk from malicious or unnecessary network traffic Firgwalls can also prevent malicious software from accessing a computer or network Via the internet SECURITY INTRUSION DETECTION system An Intrusion Detection System (IDS) is a monitoring s stem that detects suspici activities and gen when they are detected. Based upon these alerts; a security operations center (5 OC) analyst or incident tesponder can investigate the issue and take the appropriate actions to remédiate the threat, ’ SECURITY INTRUSION @® Cyber Security. Anintruston is any activity thatis designed to compromise yourdata Security, This can be through more menacing and pervasive formats like ransomware or Unintentional d; 1 : An intrusion may a zi peace by employees or others connected to your network. lude any of the following: Malware or ransomware. & Two MAIN TYPES OF INTRUSION DETECTION SYSTEMS What a : ire the different types of intrusion detection systems? ye (Bs, pease Intrusion Detection System (NIDS) Network intrusion dletestion systems operate a the network level and monitor traffic from all as levices going in and out of the network. ... + Host-based Intrusion Detection System (HIDS) ~ EXAMPLE OF INTRUSION jThe definition of an intrusion is an unwelcome interruption or a situation where somewhere private hasan unwelcome visit or addition. When you are having a quiet nap in your backyard and your neighbor's dog comes in uninvited and jumps all over you to wake you up, this is an example of an intrusion. @ 6 TYPES OF INTRUSIONS | What ate intrusions? An intrusion is a body of igneous (created under intense heat) rock that has crystallized from molten magma. ... + Dykes. ... + Stoped stocks. + Ring dykes and bell-jar plutons. ... + Centred complexes. + Sheeted intrusions. + Diapiric plutons. + Batholiths.

You might also like