0% found this document useful (0 votes)
10 views19 pages

Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views19 pages

Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

SECURITY

Content
My Details

About Company

What is Security

Important of Security

Types of Security

What are security assessments

What Is Disaster Recovery

What is Firewall

Firewall Benefits

What Is an Intrusion Detection System (IDS)

What Is an Intrusion Prevention System (IPS)

What is risk mitigation

Why do we mitigate risk

Security Import Budget

THANK YOU

Question and Answer


My Details
 D.Lasindu induwara lakshan mannapperuma
 E207390
About Company

ESOFT Metro Campus is a private sector educational


institute or college located in Colombo, Sri Lanka. It offers
academic and professional qualifications in Computing,
Business & Management, Engineering, Hospitality and
English. Established in the year 2000, the company today
has 40 branches nationwide.
What is Security

IT Security refers to the set of strategies, methods, solutions, and


tools employed by an organization to safeguard its digital assets -
such as firewalls, intrusion detection systems, antivirus software,
content filters, or any other protective measures - from theft.
The cost of a data breach

A security breach can take


Important of Security various forms, all of which can be
costly. If you do not comply with
the GDPR in the UK and EU, you
may face fines of up to £17.5
million (€20 million) or 4% of
your global revenue (whichever
is higher), or temporary or
permanent limits on processing
and collecting data.
Information security threats are
very common
Worms, viruses, data extortion,
intellectual property theft, identity
theft, and theft of physical equipment
are among them. A common type of
threat is something called
ransomware. This is when a hacker
prevents access to information or
threatens to expose it until they are
paid a set amount.
State-sponsored
hackers
 Governments finance hacker
groups to disrupt or meddle with
other countries' affairs. In one of
the greatest cyber-attacks ever,
russian-sponsored hackers The Internet of
hacked thousands of US
orgnisations over 8-9 months in
Things (IoT)
2020. Other international
orgnisations, such as NATO and The Internet of Things (IoT) is a vast
the european parliament, were network of physical objects that have
also impacted. been equipped with software and
sensors that allow them to connect to
the Internet and other devices.
Smartphones, smartwatches, and
smart houses are examples of IoT
consumer items that can control
everything from air conditioning to
door locks from a single device. Many
of these devices are vulnerable to
Types of Security

 Physical Security
 Cybersecurity
 Information Security
 Operational Security
What are security assessments

 Security assessment refers to the process of analyzing a system or


network in order to identify vulnerabilities and other weaknesses. It’s an
important part of Information Systems Management that can help you
understand and mitigate risk.

• Penetration testing
• Network scanning
• Vulnerability Assessments
What Is Disaster Recovery

 Disaster recovery (DR) is the process an organization implements to


recover from a security event that disrupts its technology operations.
Developing an IT disaster recovery plan (DRP) allows organizations to
resume operations quickly after a security event.
What is Firewall
 A firewall is a network security
solution that inspects and
regulates traffic based on
predetermined security rules,
allowing, denying, or rejecting
the traffic accordingly.
Firewalls work as a checkpoint
between internal networks
and potential external threats.
They analyze data packets
against defined security
protocols. Depending on these
protocols, firewalls determine
whether data should be
permitted or denied.
Firewall Benefits
What Is an Intrusion Detection System
(IDS)
 An intrusion detection
system (IDS) identifies
potential threats and
weaknesses in networked
systems. An IDS examines
network traffic, alerting
administrators to suspicious
activities without
intervening in data
transmission.
What Is an Intrusion Prevention System
(IPS)
 Intrusion prevention
systems (IPS) are dynamic
security solutions that
intercept and analyze
malicious traffic. They
operate preemptively to
mitigate threats before
they can infiltrate network
defenses. This reduces the
workload of security
teams.
What is risk mitigation

 Risk mitigation is the practice of reducing the impact of potential risks


by developing a plan to manage, eliminate, or limit setbacks as much as
possible. After management creates and carries out the plan, they’ll
monitor progress and assess whether or not they need to modify any
actions.
Why do we mitigate risk

 Unfortunately, ignoring risk factors won’t make risks disappear,


and forging ahead without a plan may damage your bottom line.
This is why risk mitigation is important With a concrete plan with
clear action items, you can prevent risks from turning into
problems that spin out of control or even prevent risks altogether.
This not only carries tangible benefits such as keeping your
business profitable but it also has intangible benefits, such as
helping you maintain a good reputation for stability within the
industry and keeping internal and external stakeholders happy.
Security Import Budget

Category Estimated Cost


Hardware
$100,000
(Firewalls)
Software
$40,000
(Antivirus Licenses)
Consulting Services $15,000

Customs & Import Fees $18,000


Regulatory Compliance $7,000
Contingency $5,000

Total $185,000
THANK YOU
Question and Answer

You might also like