BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.

Slides:



Advertisements
Similar presentations
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
9 - 1 Computer-Based Information Systems Control.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Security+ Guide to Network Security Fundamentals
Ensuring Continuing Operations and Disaster Recovery By: Alyssa Gatrell Mike Harker Amy Shumway.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Lecture 11 Reliability and Security in IT infrastructure.
Factors to be taken into account when designing ICT Security Policies
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Advice Georgie Pepper Campsmount Acadamy.
11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality,
Chapter 3 Ethics, Privacy & Security
Information Security Information Technology and Computing Services Information Technology and Computing Services
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1-1 Managing Information Technology. 1-2 Information ●What information do businesses keep and use? ●What information have you been exposed to today?
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
C OMPUTER C ONCEPTS Unit 1 Concept 3 – Solving Technological Problems.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
Security Architecture
 a crime committed on a computer network, esp. the Internet.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Systems Security Operational Control for Information Security.
Fill in the blanks: (1) The full form of UPS is Uninterrupted ______. 2) The monitor should be at a distance of ___feet away from the user. 3) _____ your.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Data Security.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
Module 11: Designing Security for Network Perimeters.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.
Chap1: Is there a Security Problem in Computing?.
Security Awareness – Essential Part of Security Management Ilze Murane.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Security and Ethics Safeguards and Codes of Conduct.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Building a security strategy By Raef Mchaymech. Our Case of study This is the company that we need to secure its information system.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
Securing Information Systems
Cyber Crimes Chunlian QU 9/18/2018.
INFORMATION SYSTEMS SECURITY and CONTROL
By Arisara Sangsopapun
Unit 4 IT Security Kerris Davies.
Networking for Home and Small Businesses – Chapter 8
Chapter # 3 COMPUTER AND INTERNET CRIME
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

BASIC SECURITY THREATS TO INFORMATION SYSTEMS

All information systems linked up in networks are prone to security violations. All information systems linked up in networks are prone to security violations. These could be from within the organization or outside the organization. These could be from within the organization or outside the organization. They could also be exposed to virus infections and many other forms of computer crimes. They could also be exposed to virus infections and many other forms of computer crimes.

Information System Security (ISS) involves all the precautions taken to keep all aspects of Information Systems away from unauthorized access and use.

The components to be protected among others include: All hardware All hardware All Software All Software Network Equipment Network Equipment Data Data All gateways between networks All gateways between networks

PROBABLE THREATS TO INFORMATION SYSTEMS SECURITY The most basic threats include the following: Accidents and Natural Disasters Accidents and Natural Disasters Employees and Consultants Employees and Consultants Links to outside companies Links to outside companies

Outsiders Computer Viruses Denial of Service Spyware Probable threats to information systems security continued…

PRACTICES THAT INCREASE THREAT TO INFORMATION SYSTEMS IN ORGANIZATIONS

Employees keeping passwords/access codes in the open (on paper) Employees keeping passwords/access codes in the open (on paper) Absence of antivirus software or outdated antivirus software Absence of antivirus software or outdated antivirus software Computer users in organizations continuing to use default passwords. Computer users in organizations continuing to use default passwords.

Failure to install effective fire walls or intrusion detection systems Absence of proper background checks on new employees Lack of proper monitoring of employees, particularly IT personnel. Fired, dismissed or sacked employees become disgruntled and can cause mischief. Practices that increase threat to information systems in organizations continued…