0% found this document useful (0 votes)
2 views

Information-Systems-Security-Controls Lesson 17

The document outlines various types of security controls, including technical, physical, and administrative measures to protect systems and data. It details specific controls such as firewalls, antivirus software, and access control systems, emphasizing the importance of confidentiality, integrity, and accountability. Additionally, it discusses encryption methods and the purpose of implementing security measures to safeguard sensitive information.

Uploaded by

roxieangel51
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Information-Systems-Security-Controls Lesson 17

The document outlines various types of security controls, including technical, physical, and administrative measures to protect systems and data. It details specific controls such as firewalls, antivirus software, and access control systems, emphasizing the importance of confidentiality, integrity, and accountability. Additionally, it discusses encryption methods and the purpose of implementing security measures to safeguard sensitive information.

Uploaded by

roxieangel51
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Information

Systems Security
Controls
Types of Security Controls
Technical Physical Administrative
Controls Controls Controls
Use technology to protect Protect physical infrastructure. Policies and procedures
systems. Examples: firewalls, Examples: security guards, governing security practices.
antivirus software, intrusion locks, CCTV surveillance. Examples: security policies,
detection systems. training programs.
Technical Controls in Detail
1 Firewalls
Prevent unauthorized access to or from private networks.

2 Antivirus Software
Detects and removes malicious software from systems.

3 Intrusion Detection Systems


Monitor networks for malicious activity or policy
violations.
Physical Controls Explained

Security Guards Locks and Fences CCTV Surveillance


Prevent unauthorized Restrict access to buildings Monitor sensitive areas to
individuals from entering or server rooms. detect unauthorized physical
sensitive areas. access.
Administrative Controls
Overview
1 Security Policies
Define roles and responsibilities related to security.

2 Training Programs
Ensure staff can identify and respond to security
threats.

3 Incident Response Plans


Outline how to respond to security breaches or
attacks.

4 Audit and Monitoring


Regular reviews to ensure compliance with security
policies.
Access Control Systems
Discretionary Access Control (DAC)
Data owners decide who gets access.
Flexible but potentially risky.

Mandatory Access Control (MAC)


System enforces strict policies with predefined
access levels.
Access Control Systems
Role-Based Access Control (RBAC)
Access determined by user's role in the
organization.

Multi-factor Authentication (MFA)


Requires multiple forms of identification for
access.
Purpose of Access Control Systems

Confidentiality Integrity Accountability


Ensure only authorized Prevent unauthorized Track who accessed
users access specific users from modifying data and what changes
data or resources. information. they made.
Encryption Basics
Definition Converting plain text
into unreadable
ciphertext using
cryptographic
algorithms
Symmetric Encryption Single key for
encryption and
decryption (e.g., AES)
Asymmetric Encryption Public key for
encryption, private
key for decryption
(e.g., RSA)
Purpose of Encryption
1 Confidentiality
Prevents unauthorized individuals from
reading sensitive information.

2 Integrity
Ensures data is not altered during
transmission.
3 Authentication
Verifies that data comes from a trusted
source.
4 Non-repudiation
Ensures sender cannot deny sending the
message.
Implementing Security Measures

Secure Protocols Data Storage Communication


Use SSL/TLS for securing Encrypt sensitive data Encrypt emails or any
online transactions and stored on devices, communication containing
communications. databases, and cloud confidential information.
services.
Questions
???

You might also like