0% found this document useful (0 votes)
3 views3 pages

Unit1cs Notes

Cyber Security

Uploaded by

rameshgopal6666
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views3 pages

Unit1cs Notes

Cyber Security

Uploaded by

rameshgopal6666
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Introduction

• Computers are an integral part of everyday operations.


Organizations depend on them.
• Today the cost to business of stolen, misused, or altered
information can be high, especially if real or purported damages to
customers can be raced back to mismanagement.
• That is why must value information resources within the context of
your business goals and constraints.
• The objective of security management is to eliminate or minimize
computer vulnerability to destruction, modification, or disclosure.
• If a security plan is to be effective, top management must be fully
convinced of the need to take counteractive steps.
• To assess the seriousness of a computer breakdown or loss of data,
each business has to evaluate threats to the company, the potential
losses if the threats are realized, and the time and cost that will be
necessary to recover from any breach in security

Security problems are as follows:


Sixty years ago, very few people had access to computer system or
network, and securing them was relatively an easy matter.
• There are many different ways to attack computers and networks to
take advantage of what has made shopping, banking, investment,
and leisure pursuits a simple matter of “dragging and clicking” for
many people.
• The different types of electronic crime fall into two main
Categories: crimes in which the computer was the target of the
attack, and incidents in which the computer was a means of
perpetrating a criminal act.
• There are a number of different threats to security ,including
viruses and worms, intruders, insiders ,criminal organizations,
terrorists, and information warfare conducted by foreign countries.
• The biggest change that has occurred in security over the last forty
years has been the change in the computing environment from
large mainframes to a highly interconnected network of much
smaller systems
Why network security is needed?
• On September 11, 2001, terrorists seized control of four airplanes.
Three were flown into buildings and the fourth crashed, with
catastrophic loss of life.
• In the after month, the security and reliability of many aspects of
society drew renewed scrutiny.
• One of these aspects was the widespread use of computers and
their interconnecting networks.
• The issue is not new. In 1988, approximately 5,000 computers
throughout the Internet were rendered unusable within 4 hours by a
program called “worm”.
• While the spread, and the effects, of this program alarmed
computer scientists, most people were not worried because the
worm did not affect their lives on their ability to do their jobs.
• In 1993, more users of computer systems were altered to such
dangers when a set of programs called sniffers were placed on
many computers run by network services providers and recorded
login names and passwords.
• Almost daily, it read about computer and network viruses either
about new attacks or the dangers of more potent viruses that are
difficult to track and stop. It strongly encouraged to install
antivirus software if own a computer.
• This increase in terrorist attacks on the general population, as well
as on specific segments of our society’s infrastructure, comes at a
time when large and small organizations of all types are becoming
increasingly dependent on networks to carry on their activities.
Networks have become assets like computers, data information.
• Without these assets most organizations find it impossible to
conduct business Communications with customers
suppliers,employees and other organizations are handled primarily
through networks.
• The network asset must be protected like other assets and
surrounded with proper controls and the appropriate security.
• Organizational leaders and employees in all segments want to
know what they can do to safeguard networks, their computers, and
their livelihoods.
Management principles
• “Network Security Policy” is management’s statement of the
importance of their commitment to network security).
• The network security policy needs to clearly state management’s
position about the importance of network security and the items
that are to be protected.
• Management must understand that there is no such thing as a
perfectly secure network.
• Network security is a constantly moving target because of the
advances in technology and the creativity of people who would like
to break into a network of its attached computers.
For a company to adequately manage information security on the
network, it must have the following:
1. A network security policy clearly defines the reasons why
security is important to the company.
2. Clearly defined roles and responsibilities to ensure that all
aspects of security are performed.
3. A security implementation plan that describes the steps
needed to implement the policy.
4. An effective implementation of appropriate security hardware
and software.
5. A plan to deal with any security breaches that do occur.
6. A management review process to periodically ensure that the
security policies and standards are adequate, effective and are
being enforced.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy