Using Your Knowledge – Security Threats

Slides:



Advertisements
Similar presentations
Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Advertisements

COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Information Security Management Chapter “We Have to Design It for Privacy and Security. ” Tension between Maggie and Ajit regarding terminology.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Handling Security Incidents
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Overview of IS Auditing n Need for control and Audit of Computers –Org cost of data loss –cost of incorrect decision –Value of hardware, software, personnel.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
1 Pertemuan 9 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Computer Crime and Information Technology Security
PART THREE E-commerce in Action Norton University E-commerce in Action.
Chapter 3: Types of Cyber Attacks Expand the definition of cyberspace to include: – hardware like computers, printers, scanners, servers and communication.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Anderson School of Management University of New Mexico.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Information Security Management
C8- Securing Information Systems
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
By Group B Jessica George Stephanie Williams Maria L. Moya Rekeisha Scott Alberto Camacho.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Safe’n’Sec IT security solutions for enterprises of any size.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
Securing Information Systems
Securing Information Systems
Instructor Materials Chapter 7 Network Security
Chapter 5 Electronic Commerce | Security
Securing Information Systems
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 5 Electronic Commerce | Security
A Gift of Fire Third edition Sara Baase
Ethics, Part 2 Chapter 5 pp National Income Tax Workbook™
INFORMATION SYSTEMS SECURITY and CONTROL
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Using Your Knowledge – Security Threats Chapter 12 page 491 Q2 MGS 3040-03 Group B Omotayo Adeniyi, Micale Baptiste, Robert Kuhl Claudia Murcia, Deborah Stroud

Consider the 15 categories of threat in Figure 12-1 below Source Human Error Malicious Activity Natural Disasters Unauthorized data disclosure Procedural mistakes Pretexting Phishing Spoofing Sniffing Computer crime Disclosure during recovery Problem Incorrect data modification Procedural mistakes Incorrect procedures Ineffective accounting controls System errors Hacking Incorrect data recovery Faulty service Procedural mistakes Development and installation errors Usurpation Service improperly restored Denial of Service Accidents DOS attacks Service interruption Loss of infrastructure Theft Terrorist activity Property loss

Using Your Knowledge Describe the three most serious threats to each of the following businesses: Local Workout Studio Neighborhood accounting firm Dentist’s office Honda dealership

The three most serious threats to a local workout studio are:   Unauthorized data disclosure  Human Error - when someone inadvertently releases data in violation of policy Computer crime - breaking into networks to steal data such as customer information, or employee's personal information   Human Error - It can happen by just clicking send.  Maybe you are sending an updated member list to your corporate office from your laptop thinking it was secure.  But your company does not have establised security guidelines  when working out of the office.  The list can be accessed by others and potentially create a security threat.   Computer Crime - is more common.  Most of the press reports are about outside attacks on computer systems.  It is estimated that 75% of computer crime is perpetrated by insiders, such as stealing security codes and credit card numbers.  Also customer's  personal information for malicious intent such as identity theft.  Companies also store personal information about employees.  Not just info in your employment application.  For a small fee employers can find out about your credit  card standing, telephone usage, insurance coverage.  They may also ask you to take a drug and psycological tests; the results of which are the property of the company can be accessed for malicious purposes.

The three most serious threats to a local workout studio con't   Incorrect data modification System errors - caused by employees when procedures are followed incorrectly or procedures have been designed incorrectly Faulty service - service impropertly restored System Errors - may cause the company delays in receiving payments.   Faulty Service - when the system fails and recovery plans are not propertly in place; it can cause the company loss in revenue and permanently loose valuable information.

Using Your Knowledge The three most serious threats in a neighborhood accounting firm are: Hacker- A person or thing that hacks. Also it’s when a person doesn’t have the authority or official power to have the access to a computer system. Viruses- A segment of self- replicating code planted illegally in a computer program, often to damage or shut down a system or network. Inside threats Losing client records Theft of client records Unauthorized discussions with third parties about client information

Using Your Knowledge What to do about threats: One of the most important aspects in dealing with internal threats is through control. You want to control access to only those who should have access. Document control can take several forms: Using passwords to gain access to network resources as well as within a document in order to maintain security Using document management software to control access to documents Using the file security system built into the server operating system to secure documents in folders with access for those users who require access

Using Your Knowledge Dentist’s office - The three most serious threats   Procedural mistakes Human error Improper internal control of systems that process financial data Computer crime  Hacking - attempts to steal customer data Denial of service attacks Inadvertent shutdown of Web server by starting a computationally intensive application Malicious hacker can flood a Web server with artificial traffic so legitimate traffic can't get through    Human error example:   Employee accidentally deletes customer records or mistakenly overwrites the current database with an older one during backup process or Someone inadvertently releases data in violation of policy - health/dental record details - violation of privacy rights - HIPAA (Health Insurance Portability and Accountability Act) Improper Internal control: Lack of separating duties and authority - checks and balances

Using Your Knowledge Honda dealership -The three most serious threats       Unauthorized data disclosure        Human Error             occuring by human error when someone             inadvertently releases data in violation of             policy.     Loss of infrastructure         Accidents             human accidents can cause loss of                        infrastructure

Using Your Knowledge Honda dealership-The three most serious threats   Honda dealership-The three most serious threats     Incorrect data Modification          Malicious Activity                 Hacking-Although some people hack                 for the sheer joy of doing it, others                 hack for  the malicious purpose of                 stealing or modifying data.                           

Using Your Knowledge - Security Threats Chapter 12 Group B The End!! Thank you for your time!