Presentation Topic: Software Security, Database Security and Network Security in IS
Presentation Topic: Software Security, Database Security and Network Security in IS
Think about keeping your personal information, passwords, and data safe from
hackers or loss.
Software Security :
Network Security :
Introduction
PRINCIPLES
TYPES
AGENDA THREATS
IMPORTANCE
Summary
8
PRESENTATION TITLE
9
KEY PRINCIPLES OF
SOFTWARE SECURITY
. Confi dentiality: Protect sensitive data from unauthorized access.
• Integrity: Ensure that data and code are not altered maliciously.
• Availability: Ensure that software and services remain available and functional for
authorized users.
10
PRESENTATION TITLE
1. Application security
TYPES :
Application security involves ensuring that the code
is secure by identifying and fi xing vulnerabilities
within the software itself. This includes practices
such as code reviews, automated security scanning,
secure coding practices, input validation, and
penetration testing to ensure that the application is
resilient against attacks.
11
2. Data security
3.Network Security:
PRESENTATION TITLE 12
What are the threats to Software?
PRESENTATION TITLE
THREAT 1. External Threats
13
Common external threats include:
PRESENTATION TITLE
• Malware: Malware such as viruses, worms and ransomware may enter through vulnerable
software.
2. Internal Threats:
These internal threats result from people within one organization, whether inadvertently or
purposely. They may include:
• Insider Threats: Such privileged people such as employees or others who have access to
the software may use it against the organization and steal data.
• Human Error: Unintentional employee behaviours including, misconfi guration and accident
data leaks are among the main risks.
14
Importance of Software Security
PRESENTATION TITLE
Software security is one area that should not be underestimated, because it aff ects people and
institutions alike. Here are some of the key reasons why software security is critical:
• Data Protection: Since most software are based on such confi dential data like personal or
fi nancial information. Failure of securing software results into data breach and identity theft .
• Business Continuity: Security incidents can put operations on hold, resulting in revenue
losses and a negative impact on the image of an organization.
• Regulatory Compliance: There are many countries across the globe with rigid data
protection laws, which cut across industries and governments as well. Failure to comply may
lead to legal liabilities and loss of reputation.
• User Trust: Data handling must conform to user-expectations, being highly confi dential and
careful. Customers can lose faith in a company and refuse to buy its products due to broken
trust.
16
Database Security: Protecting Your Data
•Definition:
• Database security ensures that databases (where data is
stored) are kept safe and that only authorized people can
access or alter the information.
•Importance:
• Protects sensitive data from unauthorized access, theft,
or corruption.
Common Threats to Databases
Unauthorized Access:
Threat: Individuals who should not access data can view or alter it due to weak
security measures.
Data Theft:
Threat: Hackers steal sensitive data like personal or business information.
SQL Injection:
Threat: Hackers exploit vulnerabilities to trick the database into revealing or
manipulating data.
How to Protect Databases
1.Password Protection:
Use strong, complex passwords.
Employ multi-factor authentication (MFA) for added
security.
2.Encryption:
Encrypt sensitive data so that it is unreadable to
unauthorized users, even if accessed.
1.Regular Backups:
Create automatic and regular backups to
restore data in case of loss or corruption.
2.Access Control:
Implement role-based access control (RBAC)
to ensure only authorized users can perform
sensitive actions.
Key Takeaways:
”
CONNECTING THE DOTS: A UNIFIED APPROACH TO INFORMATION
SECURITY
KEY POINTS:
1.SECURITY IS LIKE A PUZZLE; ALL PIECES MUST FIT TOGETHER FOR
COMPLETE PROTECTION.
Examples:
Insecure software may allow hackers to steal data from the database.
Weak network security can expose private information even if the database
is secure.
Impact:
Financial loss, data breaches, loss of customer trust.
Real-Life Example
2.Integration Issues:
1. Security systems across software, databases,
and networks need to work together seamlessly.
2. Lack of synchronization can leave vulnerabilities
open for exploitation.
•Encryption Everywhere:
• Database: Protect sensitive data at rest.
• Network: Use secure protocols (e.g., HTTPS,
VPN).
2.Software Security
Developing secure programs and fixing
vulnerabilities to prevent attacks.
3. Database Security
Encrypting and protecting sensitive data
stored in databases.
4. Network Security
Ensuring safe communication over the
internet and internal networks.