CHAPTER 4 Information Security.

Slides:



Advertisements
Similar presentations
4 Information Security.
Advertisements

Ethics, Privacy and Information Security
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Security+ Guide to Network Security Fundamentals
CHAPTER 3 Ethics, Privacy and Information Security.
CHAPTER 4 Information Security
CHAPTER 4 Information Security. Announcements Project 2 – due today before midnight Tuesday Class Quiz 1 – Access Basics Questions/Comments.
CHAPTER 4 Information Security. Announcements Friday Class Quiz 1 Review Monday Class Quiz 1 – Access Basics Questions/Comments.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Threats and Attacks Principles of Information Security, 2nd Edition
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 3 Ethics, Privacy & Security
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Our Digital World Second Edition
Securing Information Systems
Information Systems: Ethics, Privacy and Information Security
CHAPTER 4 Information Security
CHAPTER 3 Ethics, Privacy and Information Security.
CHAPTER 6 Information Security
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
CHAPTER 4 Information Security. Key Information Security Terms Information Security refers to all of the processes and policies designed to protect an.
Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
C8- Securing Information Systems
7 Information Security.
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
7 Information Security.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
1 PROTECTING ORGANIZATION VALUABLE ASSET CASE STUDY: PT XYZ SYSTEM INFORMATION TECHNOLOGY Group Member :  Adhitya Trisnanda  Dini Dieny  Firmando Satryo.
Security and Ethics Safeguards and Codes of Conduct.
Chapter 7 Information Security. Chapter Outline 7.1 Introduction to Information Security 7.2 Unintentional Threats to Information Systems 7.3 Deliberate.
CHAPTER 7 Information Security. 1.Introduction to Information Security 2.Unintentional Threats to Information Systems 3.Deliberate Threats to Information.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
CHAPTER 13 Information Security and Controls Introduction to Information Security 13.2 Unintentional Threats to Information Security 13.3 Deliberate.
Securing Information Systems
Managing Information Resources and Security
Information Systems Security
Securing Information Systems
CHAPTER 4 Information Security.
Add video notes to lecture
ISSeG Integrated Site Security for Grids WP2 - Methodology
CHAPTER 13 Information Security and Controls
IT Security, Crime, Compliance, and Continuity
Level 2 Diploma Unit 11 IT Security
Chapter 17 Risks, Security and Disaster Recovery
Lecture 14: Business Information Systems - ICT Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Securing Information Systems
Securing Information Systems
4 Information Security 70 slides.
Malware, Phishing and Network Policies
Securing Information Systems
CHAPTER 4 Information Security
E-Commerce Security and Fraud Issues and Protections
برنامج أمن أنظمة الحاسب
Prepared By : Binay Tiwari
Chapter 10 Security and Control.
Chapter 9 E-Commerce Security and Fraud Protection
CHAPTER 4 Information Security
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

CHAPTER 4 Information Security

CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate Threats to Information Security 4.4 What Organizations Are Doing to Protect Information Resources 4.5 Information Security Controls

LEARNING OBJECTIVES Identify the five factors that contribute to the increasing vulnerability of information resources, and provide a specific example of each one. Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Discuss the nine types of deliberate attacks. Define the three risk mitigation strategies, and provide an example of each one in the context of you owning a home. Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one.

4.1 Introduction to Information Security

Key Information Security Terms Threat Exposure Vulnerability

Five Factors Increasing the Vulnerability of Information Resources Today’s interconnected, interdependent, wirelessly-networked business environment Smaller, faster, cheaper computers and storage devices Decreasing skills necessary to be a hacker

Five Factors Increasing the Vulnerability of Information Resources continued Organized crime taking over cybercrime Lack of management support

4.2 Unintentional Threats to Information Security

Categories of Unintentional Threats Human Errors Social Engineering

Human Errors Carelessness with laptops and portable computing devices Opening questionable e-mails Careless Internet surfing Poor password selection and use

Social Engineering Tailgating Shoulder Surfing

4.3 Deliberate Threats to Information Security

Deliberate Threats Espionage or trespass Information extortion Sabotage or vandalism Theft of equipment or information

Deliberate Threats (continued) Identity Theft Compromised to Intellectual Property Software Attacks SCADA Attacks Cyberterrorism and Cyberwarfare

Software Attacks Virus Worm Trojan Horse Logic Bomb Phishing attacks Distributed denial-of-service attacks

4.4 What Organizations Are Doing to Protect Information Resources

Risk Management Risk Risk management Risk analysis Risk mitigation

Risk Mitigation Strategies Risk Acceptance Risk limitation Risk transference

4.5 Information Security Controls

Information Security Controls Physical controls Access controls Communications (network) controls

Access Controls Authentication Authorization

Communication or Network Controls Firewalls Anti-malware systems Whitelisting and Blacklisting Encryption

Communication or Network Controls (continued) Virtual private networking Secure Socket Layer Employee monitoring systems

Business Continuity Planning, Backup, and Recovery Hot Site Warm Site Cold Site

Information Systems Auditing Types of Auditors and Audits Internal External

IS Auditing Procedure Auditing around the computer Auditing through the computer Auditing with the computer

Closing Case Information Security at the International Fund for Animal Welfare The Problem The Solution The Results