You are on page 1of 19

COMP 212-WEEK 14

INNFORMATION SECURITY
PROTOCOLS
Presented by: Mr. Jayson L. Lagrimas

01/21/2021
What is Information Security?
• Deals with several different "trust" aspects of information and its
protection 
• The U.S. Government’s National Information Assurance Glossary
defines INFOSEC as:

• “Protection of information systems against unauthorized access to


or modification of information, whether in storage, processing or
transit, and against the denial of service to authorized users or the
provision of service to unauthorized users, including those
measures necessary to detect, document, and counter such threats.”

01/21/2021
What it is For?
• Information security, to protect the
confidentiality, integrity and availability
of information assets, whether in
storage, processing, or transmission. It
is achieved via the application of policy,
education, training and awareness, and
technology.

01/21/2021
What is Cyber Security?
• Cybersecurity: The ability to protect or defend
the use of cyberspace from cyber attacks.
• Cyber Security focuses on stopping breach,
protecting endpoints such as databases,
servers
• Focuses solely on online attacks
• Acts as the first line of defense
• Develops a deep understanding of malicious
software
01/21/2021
WAYS TO IMPLEMENT
Information SECURITY

01/21/2021
Authentication
• It is a process of identifying an individual and
ensuring that the individual is the same who
he/she claims to be

• How can it be done


• Something they know
• Something they have
• Something they are

01/21/2021
Encryption
• It is a technique to convert the data in
unreadable form before transmitting it
over the internet

01/21/2021
DIGITAL SIGNATURES
• It is a technique for validation of data. Validation
is a process of certifying the content of a
document. 
• The digital signatures not only validate the data
but also used for authentication. 
• The digital signature is created by encrypting the
data with the private key of the sender. 
• The encrypted data is attached along with the
original message and sent over the internet to
the destination

01/21/2021
ANTIVIRUS
• It not only prevents the malicious code to enter the
system but also detects and destroys the malicious
code that is already installed into the system

01/21/2021
FIREWALL
• It is a hardware/software which acts as a shield
between an organization's network and the internet
and protects it from the threats like virus, malware,
hackers

01/21/2021
2 TYPES OF FIREWALL
HARDWARE FIREWALLS SOFTWARE FIREWALLS:
example of hardware firewalls are These firewalls are installed and
routers through which the network is installed on the server and client
connected to the network outside the machines and it acts as a gateway to
organization i.e. Internet. the organizations‟ network

01/21/2021
Difference of Hardware and Software Firewall
Hardware Firewall Software Firewall
Sits between your local network Are installed on individual
of computers and the Internet computers on a network
Inspect all the data that comes in allow data to one program while
from the Internet, passing along blocking another. Can also filter
the safe data packets while outgoing data, as well as remote
blocking the potentially responses to outgoing requests
dangerous packets
 Require expert setup they require installation, updating
and administration on each
individual computer.

01/21/2021
Fire Wall Configuration: Proxy
• Proxy- all the outbound traffic is routed through
proxies for monitoring and controlling the packet
that are routed out of the organization. 

01/21/2021
Fire Wall Configuration: Stateful
Inspection or Dynamic Packet Filtering
• Stateful Inspection-rather than going through all the
field of a packet, key features are defined. The
outgoing/incoming packets are judged based on
those defined characteristics only.

01/21/2021
PACKET FILTERING
• based on the rules defined in the policies each
packet is filtered by their type, port information, and
source & destination information. The example of
such characteristics is IP address, Domain names,
port numbers, protocols etc. Basic packet filtering
can be performed by routers. 

01/21/2021
STEGANOGRAPHY
• It is a technique of hiding secret messages in a
document file, image file, and program or protocol
etc. such that the embedded message is invisible
and can be retrieved using special software. 

01/21/2021
Cyber FORENSICS
• Cyber forensic is a branch of
science which deals with tools and
techniques for investigation of
digital data to find evidences
against a crime which can be
produced in the court of law

01/21/2021
It is a practice of
• preserving, 
• extracting, analyzing and
• documenting evidence from digital devices.

• such as computers, digital storage media,


smartphones, etc. so that they can be used to make
expert opinion in legal/administrative matters

01/21/2021
References
• https://smallbusiness.chron.com/difference-
between-hardware-firewall-software-firewal
• https://www.trustradius.com/buyer-blog/hardware-
vs-software-firewalls
• http://www.crossdomainsolutions.com/cyber-
security/tools-techniques/
• http://www.ipcopper.com/cybersecurity.htm

01/21/2021

You might also like