SlideShare ist ein Scribd-Unternehmen logo
1 von 8
IT Security and Other
Issues
Presented By : Sir Haseeb Ahmed
DEFINITION:
• The protection of information and its elements including system,
hardware that use, store and transmit the information
PRIMARY GOALS
CIA triangle known as security triad tells the primary goals of IS
Confidentiality
• Making sure that those who should not see information
Integrity
• Making sure that the information has not been changed from its original
Availability
• Making sure that the information is available for use when you need it.
What is Information Security?
• Known as InfoSec, which is the practice of defending information from unauthorized access,
use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
• It is a general term that can be used regardless of the form the data may take (electronic,
physical, etc...)
• I.T. Security: Sometimes referred to as computer security, Information Technology Security
is information security applied to technology (most often some form of computer system).
• It is worthwhile to note that a computer does not necessarily mean a home desktop. A
computer is any device with a processor and some memory.
• IT security specialists: are almost always found in any major enterprise/establishment due to
the nature and value of the data within larger businesses.
• Information assurance: The act of ensuring that data is not lost when critical issues arise.
• These issues include but are not limited to: natural disasters, computer/server malfunction,
physical theft, or any other instance where data has the potential of being lost.
• Since most information is stored on computers in our modern era, information assurance is
typically dealt with by IT security specialists.
• One of the most common methods of providing information assurance is to have an off-site
backup of the data in case one of the mentioned issues arise.
Threats to Information System?
• There are many information security threats that we need to be constantly aware of and
protect against in order to ensure our sensitive information remains secure.
 Unauthorized Access – Enter at your own risk
 The attempted or successful access of information or systems, without permission or rights to do so.
 Ensure you have a properly configured firewall, up to date malware prevention software and all software has the
latest security updates.
 Protect all sensitive information, utilizing encryption where appropriate, and use strong passwords that are changed
regularly.
 Cyber Espionage – Hey, get off my network!
 The act of spying through the use of computers, involving the covert access or ‘hacking’ of company or
government networks to obtain sensitive information.
 Be alert for social engineering attempts and verify all requests for sensitive information.
 Ensure software has the latest security updates, your network is secure and monitor for unusual network behavior.
 Malware – You installed what?!
 A collective term for malicious software, such as viruses, worms and trojans; designed to infiltrate systems and
information for criminal, commercial or destructive purposes.
 Ensure you have a properly configured firewall, up to date malware prevention and all software has the latest
security updates.
 Do not click links or open attachments in emails from unknown senders, visit un-trusted websites or install dubious
software.
 Data Leakage – I seek what you leak.
 The intentional or accidental loss, theft or exposure of sensitive company or personal information
 Ensure all sensitive information stored on removable storage media, mobile devices or laptops is encrypted
 Be mindful of what you post online, check email recipients before pressing send, and never email sensitive company
information to personal email accounts
Threats to Information System?
 Mobile Device Attack – Lost, but not forgotten.
 The malicious attack on, or unauthorized access of mobile devices and the information stored or processed by them;
performed wirelessly or through physical possession.
 Keep devices with you at all times, encrypt all sensitive data and removable storage media, and use strong
passwords.
 Avoid connecting to insecure, un-trusted public wireless networks and ensure Bluetooth is in ‘undiscoverable’ mode.
 Spam – Email someone else
 Unsolicited email sent in bulk to many individuals, usually for commercial gain, but increasingly for spreading
malware.
 Only give your email to those you trust and never post your address online for others to view.
 Use a spam filter and never reply to spam emails or click links within them.
 Mobile Device Attack – Lost, but not forgotten.
 The theft of an unknowing individual’s personal information, in order to fraudulently assume that individual’s identity
to commit a crime, usually for financial gain.
 Never provide personal information to un-trusted individuals or websites.
 Ensure personal information is protected when stored and securely disposed of when no longer needed.
Protecting Information System
Information Security Controls
Computer security, specifically, is the protection of data in a system against unauthorized
disclosure, modification, or destruction and protection of the computer system itself against
unauthorized use, modification, or denial of service.
Physical Controls
It is the use of locks, security guards, badges, alarms, and similar measures to control access to
computers, related equipment (including utilities), and the processing facility itself.
In addition, measures are required for protecting computers, related equipment, and their
contents from espionage, theft, and destruction or damage by accident, fire, or natural disaster
(e.g., floods and earthquakes).
Technical Controls
Involves the use of safeguards incorporated in computer hardware, operations or applications
software, communications hardware and software, and related devices.
Technical controls are sometimes referred to as logical controls.
Preventive technical controls are used to prevent unauthorized personnel or programs from
gaining remote access to computing resources. Examples of these controls include:
•Access control software
•Antivirus software
•Library control systems
•Passwords
Protecting Information System
• Smart cards
• Encryption
• Dial-up access control and callback systems
Administrative Controls
Consists of management constraints, operational procedures, accountability procedures, and
supplemental administrative controls established to provide an acceptable level of protection
for computing resources.
In addition, administrative controls include procedures established to ensure that all personnel
who have access to computing resources have the required authorizations and appropriate
security clearances.
Preventive administrative controls are personnel-oriented techniques for controlling people’s
behavior to ensure the confidentiality, integrity, and availability of computing data and
programs. Examples of preventive administrative controls include:
• Security awareness and technical training
• Separation of duties
• Procedures for recruiting and terminating employees
• Security policies and procedures
• Supervision.
• Disaster recovery, contingency, and emergency plans
• User registration for computer access
Internet Security?
In 1980 a computer cracked a 3-character password within one minute.
In 1999 a team of computers cracked a 56-character password within one day.
In 2004 a computer virus infected 1 million computers within one hour.
1.Computer Virus:
•Needs a host file
•Copies itself
•Executable
2.Network Worm
•No host (self-contained)
•Copies itself
•Executable
3.Trojan Horse:
•No host (self-contained)
•Does not copy itself
•Imposter Program

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networkingJafar Nesargi
 
Operating system and its function
Operating system and its functionOperating system and its function
Operating system and its functionNikhi Jain
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communicationHarpreet Dhaliwal
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Types of software
Types of softwareTypes of software
Types of softwarelatifah2001
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Operating system and its types
Operating system and its types Operating system and its types
Operating system and its types vimal kumar arora
 
Types of internet connections
Types of internet connectionsTypes of internet connections
Types of internet connectionsyashgaba
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer networkAmit Shaw
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 

Was ist angesagt? (20)

Software vs hardware
Software vs hardwareSoftware vs hardware
Software vs hardware
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
Operating system and its function
Operating system and its functionOperating system and its function
Operating system and its function
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communication
 
Cyber security
Cyber securityCyber security
Cyber security
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Types of software
Types of softwareTypes of software
Types of software
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
 
Operating system and its types
Operating system and its types Operating system and its types
Operating system and its types
 
Computer processing
Computer processingComputer processing
Computer processing
 
Types of internet connections
Types of internet connectionsTypes of internet connections
Types of internet connections
 
Security threats
Security threatsSecurity threats
Security threats
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 

Ähnlich wie IT Security Issues Presented

InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMANAND MURALI
 
Computer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptxComputer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptxdagiabebe267
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsKimarie Brown
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxJanani S
 
Information Security
Information Security Information Security
Information Security Dio Pratama
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdfShyma Jugesh
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 

Ähnlich wie IT Security Issues Presented (20)

InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
Computer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptxComputer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptx
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
IS Unit II.pptx
IS Unit II.pptxIS Unit II.pptx
IS Unit II.pptx
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Data security
Data securityData security
Data security
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
Information Security
Information Security Information Security
Information Security
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf
 
computer security .ppt
computer security .pptcomputer security .ppt
computer security .ppt
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Security - Chapter 1.ppt
Security - Chapter 1.pptSecurity - Chapter 1.ppt
Security - Chapter 1.ppt
 

Kürzlich hochgeladen

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 

Kürzlich hochgeladen (17)

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 

IT Security Issues Presented

  • 1. IT Security and Other Issues Presented By : Sir Haseeb Ahmed
  • 2. DEFINITION: • The protection of information and its elements including system, hardware that use, store and transmit the information PRIMARY GOALS CIA triangle known as security triad tells the primary goals of IS Confidentiality • Making sure that those who should not see information Integrity • Making sure that the information has not been changed from its original Availability • Making sure that the information is available for use when you need it.
  • 3. What is Information Security? • Known as InfoSec, which is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. • It is a general term that can be used regardless of the form the data may take (electronic, physical, etc...) • I.T. Security: Sometimes referred to as computer security, Information Technology Security is information security applied to technology (most often some form of computer system). • It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory. • IT security specialists: are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. • Information assurance: The act of ensuring that data is not lost when critical issues arise. • These issues include but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. • Since most information is stored on computers in our modern era, information assurance is typically dealt with by IT security specialists. • One of the most common methods of providing information assurance is to have an off-site backup of the data in case one of the mentioned issues arise.
  • 4. Threats to Information System? • There are many information security threats that we need to be constantly aware of and protect against in order to ensure our sensitive information remains secure.  Unauthorized Access – Enter at your own risk  The attempted or successful access of information or systems, without permission or rights to do so.  Ensure you have a properly configured firewall, up to date malware prevention software and all software has the latest security updates.  Protect all sensitive information, utilizing encryption where appropriate, and use strong passwords that are changed regularly.  Cyber Espionage – Hey, get off my network!  The act of spying through the use of computers, involving the covert access or ‘hacking’ of company or government networks to obtain sensitive information.  Be alert for social engineering attempts and verify all requests for sensitive information.  Ensure software has the latest security updates, your network is secure and monitor for unusual network behavior.  Malware – You installed what?!  A collective term for malicious software, such as viruses, worms and trojans; designed to infiltrate systems and information for criminal, commercial or destructive purposes.  Ensure you have a properly configured firewall, up to date malware prevention and all software has the latest security updates.  Do not click links or open attachments in emails from unknown senders, visit un-trusted websites or install dubious software.  Data Leakage – I seek what you leak.  The intentional or accidental loss, theft or exposure of sensitive company or personal information  Ensure all sensitive information stored on removable storage media, mobile devices or laptops is encrypted  Be mindful of what you post online, check email recipients before pressing send, and never email sensitive company information to personal email accounts
  • 5. Threats to Information System?  Mobile Device Attack – Lost, but not forgotten.  The malicious attack on, or unauthorized access of mobile devices and the information stored or processed by them; performed wirelessly or through physical possession.  Keep devices with you at all times, encrypt all sensitive data and removable storage media, and use strong passwords.  Avoid connecting to insecure, un-trusted public wireless networks and ensure Bluetooth is in ‘undiscoverable’ mode.  Spam – Email someone else  Unsolicited email sent in bulk to many individuals, usually for commercial gain, but increasingly for spreading malware.  Only give your email to those you trust and never post your address online for others to view.  Use a spam filter and never reply to spam emails or click links within them.  Mobile Device Attack – Lost, but not forgotten.  The theft of an unknowing individual’s personal information, in order to fraudulently assume that individual’s identity to commit a crime, usually for financial gain.  Never provide personal information to un-trusted individuals or websites.  Ensure personal information is protected when stored and securely disposed of when no longer needed.
  • 6. Protecting Information System Information Security Controls Computer security, specifically, is the protection of data in a system against unauthorized disclosure, modification, or destruction and protection of the computer system itself against unauthorized use, modification, or denial of service. Physical Controls It is the use of locks, security guards, badges, alarms, and similar measures to control access to computers, related equipment (including utilities), and the processing facility itself. In addition, measures are required for protecting computers, related equipment, and their contents from espionage, theft, and destruction or damage by accident, fire, or natural disaster (e.g., floods and earthquakes). Technical Controls Involves the use of safeguards incorporated in computer hardware, operations or applications software, communications hardware and software, and related devices. Technical controls are sometimes referred to as logical controls. Preventive technical controls are used to prevent unauthorized personnel or programs from gaining remote access to computing resources. Examples of these controls include: •Access control software •Antivirus software •Library control systems •Passwords
  • 7. Protecting Information System • Smart cards • Encryption • Dial-up access control and callback systems Administrative Controls Consists of management constraints, operational procedures, accountability procedures, and supplemental administrative controls established to provide an acceptable level of protection for computing resources. In addition, administrative controls include procedures established to ensure that all personnel who have access to computing resources have the required authorizations and appropriate security clearances. Preventive administrative controls are personnel-oriented techniques for controlling people’s behavior to ensure the confidentiality, integrity, and availability of computing data and programs. Examples of preventive administrative controls include: • Security awareness and technical training • Separation of duties • Procedures for recruiting and terminating employees • Security policies and procedures • Supervision. • Disaster recovery, contingency, and emergency plans • User registration for computer access
  • 8. Internet Security? In 1980 a computer cracked a 3-character password within one minute. In 1999 a team of computers cracked a 56-character password within one day. In 2004 a computer virus infected 1 million computers within one hour. 1.Computer Virus: •Needs a host file •Copies itself •Executable 2.Network Worm •No host (self-contained) •Copies itself •Executable 3.Trojan Horse: •No host (self-contained) •Does not copy itself •Imposter Program