it vocab n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
IT Vocab PowerPoint Presentation
Download Presentation
IT Vocab

Loading in 2 Seconds...

play fullscreen
1 / 12
zaccheus-meboo

IT Vocab - PowerPoint PPT Presentation

111 Views
Download Presentation
IT Vocab
An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. IT Vocab • IT = information technology • Server • Public – open access • Private – limited access • Client or host • Thin - diskless • Workstation – fully functioning computer system

  2. IT Vocab • A computing system : a configuration of one or more computers along with the software and data.

  3. IT Vocab • Subject – a person or process • Object – assets like data, applications, documentation, hardware.

  4. Tenets of IT Security CS5493

  5. A I C • Availability – assets are available in a timeframe where it matters. • Integrity – assets remain in their legitimate expected state. • Confidentiality - assets are accessed only by authorized subjects.

  6. What are assets? • An asset is something of value: • Hardware • Software • Data • Employees • Equipment • Reputation • Infrastructure

  7. AIC and Threat Categories • Denial or destruction threats • Alteration threats • Improper disclosure threats

  8. The Domains of IT Infrastructure • User domain • Workstation domain • LAN domain • LAN-to-WAN domain • WAN domain • Remote Access domain • Server (System)/Application domain

  9. Domain Breakdown • The IT infrastructure is broken into different domains so security policy can be organized effectively.

  10. IT Domain Security Policy • A comprehensive security plan can be devised by considering each separate domain. • Identify the threats and vulnerabilities • Devise a strategy for eliminating the vulnerabilities.

  11. Vulnerabilities Examples: • User – lack of awareness or concern for security policy. • Workstation domain – unauthorized access • LAN – spreading of malicious software • WAN – malicious attacks by anonymous sources • Remote access – Data leakage due to loss or theft of electronic devise • Server/App – Data loss due to software and hardware failures.

  12. Domain Threat Targets • User – misuse of resources, social engineering • Workstation – OS, applications • LAN – hubs, cables, supporting software, etc. • WAN – routers, firewalls, supporting software, etc. • Remote Access – VPN • Server Application – e-mail, file services, database, etc.