Sei sulla pagina 1di 11

IT SECURITY

Corporate and Government agencies need to PowerPlugs proactively protect their critical applications, data and processes from external and internal threats throughout their entire life cycle. By taking a comprehensive and integrated approach to Click to edit Templates for Master PowerPoint subtitle style application vulnerability management, agencies can measurably improve operational security, mitigate risks, and reduce costs.

IT SECURITY
A recent study indicates that over 93% PowerPlugs of information produced is in digital format. The same study also noted that 85% of all criminal, civil, and company violations are Click to edit Templates for Master PowerPoint subtitle style done by means of digital Intrusion.

POSSIBILITY OF BREACH OF IT SECURITY

PowerPlugs

Theft of Company Secrets (client or employee lists) Employee Sabotage or Terrorism Credit Card Fraud Financial Crimes Embezzlement (money or information) Economic Crimes Harassment (sexual) Child Pornography Templates Click to edit for Master PowerPoint subtitle style Major Crimes Identity Theft (short or long-term plans)

PowerPlugs

Click to edit Templates for Master PowerPoint subtitle style

INTERNAL INTRUSION
Pen Drive Intrusion

PowerPlugs o Recorded as per O/S artifacts with timeline


Click Area Templates to edit for Master PowerPoint subtitle style Local Network Intrusion

o Details of all pen drives installed on a system

o Analysis of all pen drives used on different work station on a Network

o Any suspected user Login Analysis with Victims computer in the Network o Artifacts with regard to different incidents taken place during that log on period

EXTERNAL INTRUSION
1. Web Intrusion

PowerPlugs
2. Mails

Trojan Malware Spyware

As an Attachment Click to edit Templates Master PowerPoint subtitle style 3. for IM During communication Attachment

NEED OF IT SECURITY
IT Security is now a basic requirement because PowerPlugs global computing is inherently insecure. Information Security means protecting information from unauthorized access. Click to edit Templates for Master PowerPoint subtitle style is a continue process to Information security protect your information.

IT SECURITY
CIA Triangle

PowerPlugs

Confidentiality Integrity Availability

Confidentiality Ensuring that your information remains confidential and Click to edit Templates for Master PowerPoint subtitle style remains with only to those who should access that information. Information Integrity Knowing that no one has been able to change your information, so you can depend on its accuracy. Availability Making sure that your information is available when you need it.

IT INFRASTRUCTURE
PowerPlugs Routers

Servers

Firewall

Network Click to edit Templates for Master PowerPoint subtitle style Web

Users

OUR PROCESS MODEL


First Phase Identification of Targets System Fingerprinting, Enumeration, Checking the Information Flow Second Phase PowerPlugs Identification of Vulnerabilities and Potential Risks Non Destructive Exploitation of found Vulnerabilities Third Phase Result Collation and Report Writing Giving the Finalsubtitle Reportstyle to the Client about total health of I T Click Templates to edit for Master PowerPoint Infrastructure. Fourth Phase Suggestions for smooth & secure IT environment and Business continuity. Recommendation of Industry Best Solutions to maintain secure environment to deal with future Threats and Challenges.

PowerPlugs

THANK YOU
Click to edit Templates for Master PowerPoint subtitle style

Potrebbero piacerti anche