You are on page 1of 17

Technology for protecting

information resources

ALEENA CYROSH
99522501007
S3, MBA GENERAL
Protecting information resources in management information
systems involves employing various technologies and practices to
ensure confidentiality, integrity, and availability of data. Some key
technologies include:
● Firewalls
● Encryption
● Intrusion Detection and Prevention System (IDPS)
● Access control systems
● Antivirus Software
● Security Information and Event Management (SIEM)
● Multi-Factor Authentication (MFA)
● Regular Backups
● Security Patching
● Network Segmentation
● Security Policies and Training
● Biometric Authentication
1. FIREWALLS
● A firewall is a security device that can help
protect your internet network by filtering
unknown traffic and blocking outsiders from
gaining access to your private data.

● A firewall serves as an intermediary between


a personal or enterprise network and the
public internet.

● Different types of firewalls are:


1. Basic packet filtering firewalls
2.Circuit level gateways
3.Application level gateways
4.Stateful inspection firewalls
5.Next generation firewalls

● Eg: Windows Firewall


2.ENCRYPTION

● A process of encoding data


upon its transmission or
storage so that only
authorized individuals can
read it.

● The fundamental purpose of


encryption is to protect
sensitive information being
seen by those with
unauthorized access.

● Most common forms of


encryption are:
Symmetric and
Asymmetric.
3.INTRUSION
DETECTION AND
PREVENTION
SYSTEM (IDPS)
● These are security measures
that monitor network traffic
for suspicious activity and take
actions to prevent
unauthorized access or
malicious activity.

● IDPS technologies are


commonly used in
organizations to help protect
against cyber threats.
4.ACCESS CONTROL
SYSTEMS
● Manage and restrict access to
information resources based on user
roles and permissions.

● Implementing acess controls restricts


unauthorized users from accessing
certain information, systems or
functionalities.
5. ANTI VIRUS SOFTWARE
● Regularly updating and
using antivirus software
helps detect and remove
malicious software,
protecting information
systems from malware
threats.
6. SECURITY INFORMATION AND EVENT
MANAGEMENT (SIEM)

● Allow businesses to ● Respond to security


detect threats that may incidents more
otherwise go effectively.
undetected. ● Improves the security
posture.
SIEM

● Meets compliance ● Increases efficiency, save


regulations or time and money.
insurance
requirements.
7. MULTI-FACTOR
AUTHENTICATION

● Multi-factor Authentication
(MFA) is an authentication
method that requires the user
to provide two or more
verification factors to gain
access to a resource such as an
application, online account, or
a VPN.
8. REGULAR BACKUPS

● Implementing regular data backups ensures that


You can Resize without
losing quality
in case of a security incident or data loss,
You can Change Fill organizations can recover their information to a
Color & previous state.
Line Color
● Regular data backups are critical in today's data-
driven world.

● Data loss incidents can result in significant


financial loss, operational disruption, and a
damaged reputation.
FREE
PPT ● Therefore, it's crucial to implement a robust data
backup strategy to protect against such risks and
TEMPLATES ensure business continuity.
www.allppt.com
9. SECURITY PATCHING

● Security patches are software and operating system updates that aim to fix
security vulnerabilities in a program or product.
● These updates literally “patch” a hole in your defense, preventing a hacker or
piece of malware from exploiting a way into your network.

● If you've seen a message that says your Android security patch level is too low,
you need to install an update to ensure that your device remains secure. A
patch is released to maintain software to keep it running smoothly and up-to-
date
11. SECURITY POLICIES AND TRAINING

● Establishing and enforcing security policies, along with providing regular


training to employees, helps create a security-aware culture within an
organization.
● Three types of security policies are :
1. Program policy
2.Issue specific policy
3.System specific policy
12. BIOMETRIC AUTHENTICATION

● Uses systems that read and interpret


individual human traits, such as fingerprints,
irises, and voices to grant or deny access.
● Based on the measurement of a physical or
behavioral trait that makes each individual
unique.
● Compares a person's unique characteristics
against a stored profile of these characteristics
to determine any differences between these
characteristics and the stored profile.
THANK YOU

You might also like