BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Ethics, Privacy and Information Security
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Ch.5 It Security, Crime, Compliance, and Continuity
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 6
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Saving Your Business from a Data Loss Randy Clark.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Protecting ICT Systems
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Marine Industry Day 2015 Sector Command Center (24 hours): (504) National Response Center: Website:
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
DEVELOPING A RISK ANALYSIS. What is a risk analysis? A Risk analysis is concerned with identifying the risks that an organisation is exposed to, identifying.
1.1 System Performance Security Module 1 Version 5.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Topic 5: Basic Security.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
Alex Adamec.  Any physical or virtual information system that controls, processes, transmits, receives, or stores electronic information in any form.
CONTROLLING INFORMATION SYSTEMS
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 4 E-Commerce Threats.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Safe’n’Sec IT security solutions for enterprises of any size.
MIS323 – Business Telecommunications Chapter 10 Security.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
IIA – Cyber Security Event Cyber Risks James Humbles June 2016.
Welcome to the ICT Department Unit 3_5 Security Policies.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Securing Information Systems
Securing Information Systems
Technology and Business Continuity
E&O Risk Management: Meeting the Challenge of Change
Lecture 14: Business Information Systems - ICT Security
CHAPTER 4 Information Security.
Securing Information Systems
Unit 11 Task #1 Read the unit specification and create a glossary which defines each of the words / terms you don’t know.
INFORMATION SYSTEMS SECURITY and CONTROL
Objectives Telecommunications and Network Physical and Personnel
LO1 - Know about aspects of cyber security
Presentation transcript:

BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS

BTEC NAT Unit 15 - Organisational Systems Security Learning Objectives OTHER THREATS (causing Damage or Destruction of Systems or Information) Natural Disasters Natural Disasters Malicious Damage (internal or external) Malicious Damage (internal or external) Technical Failures Technical Failures Human Errors Human Errors Theft Theft

BTEC NAT Unit 15 - Organisational Systems Security Natural Disasters Natural Disasters Range from simple power cuts to floods or fire Range from simple power cuts to floods or fire Require organisational measures to cope with extreme issues Require organisational measures to cope with extreme issues Affects depend on how critical the system is – air traffic Affects depend on how critical the system is – air traffic Employ necessary technology to provide resilience Employ necessary technology to provide resilience

BTEC NAT Unit 15 - Organisational Systems Security Natural Disasters Natural Disasters DISASTER RECOVERY POLICY Remote storage of data acquired in daily backups Remote storage of data acquired in daily backups Remote Mirroring of critical servers Remote Mirroring of critical servers Alternative data centres to transfer control at times of serious emergency Alternative data centres to transfer control at times of serious emergency

BTEC NAT Unit 15 - Organisational Systems Security Malicious Damage Internal & External causes Internal & External causes Hackers or disgruntled employees Hackers or disgruntled employees Can be physical damage as well Can be physical damage as well Security techniques required to limit access Security techniques required to limit access

BTEC NAT Unit 15 - Organisational Systems Security Technical Failures Always a risk with complex systems Loss of servers, storage devices, internet connections Technical damage can cause commercial damage and also inhibit the security of systems

BTEC NAT Unit 15 - Organisational Systems Security Human Errors The most unpredictable and common causes of security issues in networks The most unpredictable and common causes of security issues in networks Forgetfulness, Ignorance, Innocence, Lack of knowledge Forgetfulness, Ignorance, Innocence, Lack of knowledge Backup data and place in a secure location Backup data and place in a secure location Erase hard drives before disposal of computers Erase hard drives before disposal of computers Close ports on firewalls Close ports on firewalls All can lead to network intrusion and viruses All can lead to network intrusion and viruses Increased attacks on broadband connections Increased attacks on broadband connections Social engineering and phishing attacks Social engineering and phishing attacks

BTEC NAT Unit 15 - Organisational Systems Security Theft Impacts caused by theft of data & technical property Hacking or data removal via CD or memory stick Non-shredding of discarded printouts Theft of computers, laptops & external hard drives Can cause long-term commercial damage, give advantage to competitors, loose customer good-will, financial ruin, loss of employment or legal actions

BTEC NAT Unit 15 - Organisational Systems Security Individual / Pairs Activity 3 CYBER DAMAGE Research ‘cyber damage’ by internet search Research ‘cyber damage’ by internet search Find out how many insurance companies now offer cover for this possibility Find out how many insurance companies now offer cover for this possibility