Professional Documents
Culture Documents
INFORMATION
SECURITY
IS Security threats
An information security threat can be defined as
Countermeasures
Access Control
Hardware-based Access Control Systems
Access terminal
Visual event monitoring
Identification cards
Biometric identification
Video surveillance
Password Schemes
Firewalls
Countermeasures
Software Vulnerability Control
one of the most important parts of computer and
network security for the following reasons.
Virus programs use vulnerabilities in operating
system and application software to gain
unauthorized access, spread, and do damage.
Intruders use vulnerabilities in operating system and
application software to gain unauthorized access,
attack other systems, and do damage.
Some software itself may be hostile
Countermeasures
Software Vulnerability Control
Keep anti-malware programs current and updated
Update software security patches
Restrict install and use of only approved software
Manage device profiles
Periodic check and updating of software vulnerability
assessment and countermeasures
Countermeasures
Cryptography
Symmetric / Secret key cryptography
Asymmetric / Public key cryptography
Hash functions
Digital signatures
Cryptographic techniques
Impact Reduction
Fully understands the nature of the problem
Put in early detection mechanisms and periodic checks/assessments
Implement fail-safe mechanisms
Risk transfer