1 / 16

DR. BABASAHEB AMBEDKAR MARATHWADA UNIVERSITY AURANGABAD Centre for Information & Network Security

DR. BABASAHEB AMBEDKAR MARATHWADA UNIVERSITY AURANGABAD Centre for Information & Network Security. Dr. Salunkhe Neeraj CISA,CISM,CISSP. Need. The internet is spreading rapidly but the risks associated with the use of internet need to be also addressed.

donnap
Télécharger la présentation

DR. BABASAHEB AMBEDKAR MARATHWADA UNIVERSITY AURANGABAD Centre for Information & Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DR. BABASAHEB AMBEDKAR MARATHWADA UNIVERSITY AURANGABADCentre for Information & Network Security Dr. SalunkheNeeraj CISA,CISM,CISSP

  2. Need • The internet is spreading rapidly but the risks associated with the use of internet need to be also addressed. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP

  3. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP

  4. Elements of Information Security Dr.Salunkhe Neeraj ,CISA,CISM,CISSP

  5. Additional Security services • Audit Dr.Salunkhe Neeraj ,CISA,CISM,CISSP

  6. Data Integrity • Data integrity services address the unauthorized or accidental modification of data. This includesdata insertion, deletion, and modification. To ensure data integrity, a system must be able todetect unauthorized data modification. The goal is for the receiver of the data to verify that the datahas not been altered. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP

  7. Confidentiality • Confidentiality services restrict access to the content of sensitive data to only those individuals • who are authorized to view the data. Confidentiality measures prevent the unauthorized disclosure • of information to unauthorized individuals or processes. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP

  8. Availability • End of Space and Time; • This is the greatest strength of Information Technology which should be retained i.e. always authorised access is expected but due to easy availability the probability of unauthorised access also enhances. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP

  9. Identification and authentication • Identification and authentication services establish the validity of a transmission, message, and • its originator. The goal is for the receiver of the data to determine its origin. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP

  10. Non-repudiation • Non-repudiation services prevent an individual from denying that previous actions had been performed. • The goal is to ensure that the recipient of the data is assured of the sender’s identity. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP

  11. National Mission on education through ICT National Mission on education through ICT is helping the spread of Internet. Centre for Information and Network Security, Dr. BAMU, Aurangabad has focus on the issues related to Information and Internet security. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP

  12. In this reference CINS which expects funding from NME-ICT, so as to launch, and develop activities as listed below. CINS, Dr.B.A.M.U will provide services like, Dr.Salunkhe Neeraj ,CISA,CISM,CISSP

  13. 1. Information Security and Network Security Management 2. Information Security and IT auditing, 3. Wireless (wi-fi) security 4. VPN solutions 5. Identity and Data Protection in Cloud environment The services will be provided to University campus and the college networks connected to university networks. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP

  14. In addition, CINS is willing to provide all such services to NME-ICT as per the requirements. Deliverables: Certificate courses in Information Security,Auditing ISO 27000, Vulnerability Assessment Dr.Salunkhe Neeraj ,CISA,CISM,CISSP

  15. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP

  16. Thank You salunkhe@indiatimes.com Dr.Salunkhe Neeraj ,CISA,CISM,CISSP

More Related