160 likes | 171 Views
Protect information from unauthorized access, modification, and destruction with services in auditing, data integrity, and more. Join our courses!
E N D
DR. BABASAHEB AMBEDKAR MARATHWADA UNIVERSITY AURANGABADCentre for Information & Network Security Dr. SalunkheNeeraj CISA,CISM,CISSP
Need • The internet is spreading rapidly but the risks associated with the use of internet need to be also addressed. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP
Elements of Information Security Dr.Salunkhe Neeraj ,CISA,CISM,CISSP
Additional Security services • Audit Dr.Salunkhe Neeraj ,CISA,CISM,CISSP
Data Integrity • Data integrity services address the unauthorized or accidental modification of data. This includesdata insertion, deletion, and modification. To ensure data integrity, a system must be able todetect unauthorized data modification. The goal is for the receiver of the data to verify that the datahas not been altered. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP
Confidentiality • Confidentiality services restrict access to the content of sensitive data to only those individuals • who are authorized to view the data. Confidentiality measures prevent the unauthorized disclosure • of information to unauthorized individuals or processes. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP
Availability • End of Space and Time; • This is the greatest strength of Information Technology which should be retained i.e. always authorised access is expected but due to easy availability the probability of unauthorised access also enhances. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP
Identification and authentication • Identification and authentication services establish the validity of a transmission, message, and • its originator. The goal is for the receiver of the data to determine its origin. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP
Non-repudiation • Non-repudiation services prevent an individual from denying that previous actions had been performed. • The goal is to ensure that the recipient of the data is assured of the sender’s identity. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP
National Mission on education through ICT National Mission on education through ICT is helping the spread of Internet. Centre for Information and Network Security, Dr. BAMU, Aurangabad has focus on the issues related to Information and Internet security. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP
In this reference CINS which expects funding from NME-ICT, so as to launch, and develop activities as listed below. CINS, Dr.B.A.M.U will provide services like, Dr.Salunkhe Neeraj ,CISA,CISM,CISSP
1. Information Security and Network Security Management 2. Information Security and IT auditing, 3. Wireless (wi-fi) security 4. VPN solutions 5. Identity and Data Protection in Cloud environment The services will be provided to University campus and the college networks connected to university networks. Dr.Salunkhe Neeraj ,CISA,CISM,CISSP
In addition, CINS is willing to provide all such services to NME-ICT as per the requirements. Deliverables: Certificate courses in Information Security,Auditing ISO 27000, Vulnerability Assessment Dr.Salunkhe Neeraj ,CISA,CISM,CISSP
Thank You salunkhe@indiatimes.com Dr.Salunkhe Neeraj ,CISA,CISM,CISSP