SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Most common threats to  information security Ana Meskovska [email_address]   ELSA Conference Strumica,  27.11.2008
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is an information security threat? ,[object Object],[object Object],[object Object],[object Object]
Information security threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Security Breaches Survey 2008  1/3 ,[object Object]
Information Security Breaches Survey 2008 2/3 ,[object Object],How many UK businesses have disaster recovery plans?
Information Security Breaches Survey 2008 3/3 ,[object Object]
Internet security threats ,[object Object],[object Object],[object Object],[object Object]
Most common internet threats, consequences and protection Malware   threats
Malware threat ,[object Object],[object Object],[object Object]
Security  and productivity threats posed by malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protection against malwares ,[object Object],[object Object],[object Object],[object Object],[object Object]
Most common internet threats, consequences and protection E-mail threats
Threats to the security of e-mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Countermeasures to e-mail security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
When using an e-mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Precautions when using a e-mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Most common internet threats, consequences and protection SPAM
Security threats from SPAM  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Countermeasures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Most common internet threats, consequences and protection Social Engineering Threat (Phishing)
Social Engineering ,[object Object],[object Object],[object Object]
Security threats from phishing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Prevention ,[object Object],[object Object],[object Object],[object Object]
Top 10 internet threats
TOP 10 threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
learnt
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 

Was ist angesagt? (20)

Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Physical security
Physical securityPhysical security
Physical security
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Andere mochten auch

Threats to information security
Threats to information securityThreats to information security
Threats to information security
swapneel07
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
Energy conservation week celebration
Energy conservation week celebrationEnergy conservation week celebration
Energy conservation week celebration
Sudha Arun
 
Data Warehouse Optimization
Data Warehouse OptimizationData Warehouse Optimization
Data Warehouse Optimization
Cloudera, Inc.
 
CUDA performance study on Hadoop MapReduce Cluster
CUDA performance study on Hadoop MapReduce ClusterCUDA performance study on Hadoop MapReduce Cluster
CUDA performance study on Hadoop MapReduce Cluster
airbots
 

Andere mochten auch (20)

Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Security threats
Security threatsSecurity threats
Security threats
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Ethical issues in business
Ethical issues in businessEthical issues in business
Ethical issues in business
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Penyajian Data dalam Bentuk Diagram Batang, Lambang, Garis dan Lingkaran
Penyajian Data dalam Bentuk Diagram Batang, Lambang, Garis dan LingkaranPenyajian Data dalam Bentuk Diagram Batang, Lambang, Garis dan Lingkaran
Penyajian Data dalam Bentuk Diagram Batang, Lambang, Garis dan Lingkaran
 
The Fashion Channel
The Fashion ChannelThe Fashion Channel
The Fashion Channel
 
Calibration & Testing of Electronic Meters
Calibration & Testing of Electronic MetersCalibration & Testing of Electronic Meters
Calibration & Testing of Electronic Meters
 
Unit 1 Task 1
Unit 1 Task 1Unit 1 Task 1
Unit 1 Task 1
 
Electronic Filing and Payment System For Entrepreneurs, Self-Employed Individ...
Electronic Filing and Payment System For Entrepreneurs, Self-Employed Individ...Electronic Filing and Payment System For Entrepreneurs, Self-Employed Individ...
Electronic Filing and Payment System For Entrepreneurs, Self-Employed Individ...
 
Mis case study - Procter & Gamble
Mis case study  - Procter & GambleMis case study  - Procter & Gamble
Mis case study - Procter & Gamble
 
Data center Building & General Specification
Data center Building & General Specification Data center Building & General Specification
Data center Building & General Specification
 
Energy conservation week celebration
Energy conservation week celebrationEnergy conservation week celebration
Energy conservation week celebration
 
Data Warehouse Optimization
Data Warehouse OptimizationData Warehouse Optimization
Data Warehouse Optimization
 
CUDA performance study on Hadoop MapReduce Cluster
CUDA performance study on Hadoop MapReduce ClusterCUDA performance study on Hadoop MapReduce Cluster
CUDA performance study on Hadoop MapReduce Cluster
 
Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security
 

Ähnlich wie 3 Most Common Threats Of Information Security

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
Jana Baxter
 

Ähnlich wie 3 Most Common Threats Of Information Security (20)

Computer Threat.pdf
Computer Threat.pdfComputer Threat.pdf
Computer Threat.pdf
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Seminar ppt.pptx
Seminar ppt.pptxSeminar ppt.pptx
Seminar ppt.pptx
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

Mehr von Ana Meskovska

1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information
Ana Meskovska
 
4 System For Information Security
4 System For Information Security4 System For Information Security
4 System For Information Security
Ana Meskovska
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
Ana Meskovska
 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet
Ana Meskovska
 

Mehr von Ana Meskovska (18)

Assessing the institutionalisation of knowledge in an automotive factory at Fiat
Assessing the institutionalisation of knowledge in an automotive factory at FiatAssessing the institutionalisation of knowledge in an automotive factory at Fiat
Assessing the institutionalisation of knowledge in an automotive factory at Fiat
 
Stimulating management innovation through knowledge management
Stimulating management innovation through knowledge management Stimulating management innovation through knowledge management
Stimulating management innovation through knowledge management
 
E-educational games in formal education - Poster
E-educational games in formal education - PosterE-educational games in formal education - Poster
E-educational games in formal education - Poster
 
E-educational games in formal education - ePrototype Bazaar 2011
E-educational games in formal education - ePrototype Bazaar 2011E-educational games in formal education - ePrototype Bazaar 2011
E-educational games in formal education - ePrototype Bazaar 2011
 
How to implement effective ITSM System
How to implement effective ITSM SystemHow to implement effective ITSM System
How to implement effective ITSM System
 
Increasing trust towards governmental e-services
Increasing trust towards governmental e-servicesIncreasing trust towards governmental e-services
Increasing trust towards governmental e-services
 
Increasing trust towards government e-services
Increasing trust towards government e-servicesIncreasing trust towards government e-services
Increasing trust towards government e-services
 
Information Security for increased usage of e-services - Masit Open Days 2010
Information Security for increased usage of e-services - Masit Open Days  2010Information Security for increased usage of e-services - Masit Open Days  2010
Information Security for increased usage of e-services - Masit Open Days 2010
 
E-prototype bazaar - Makedonija
E-prototype bazaar - MakedonijaE-prototype bazaar - Makedonija
E-prototype bazaar - Makedonija
 
Proposal for cross border cooperation
Proposal for cross border cooperationProposal for cross border cooperation
Proposal for cross border cooperation
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information
 
4 System For Information Security
4 System For Information Security4 System For Information Security
4 System For Information Security
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet
 
Business Process Modeling
Business Process ModelingBusiness Process Modeling
Business Process Modeling
 
ITSM Qualification Schemes
ITSM Qualification SchemesITSM Qualification Schemes
ITSM Qualification Schemes
 
Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000
 
Integration of ICT Standards
Integration of ICT StandardsIntegration of ICT Standards
Integration of ICT Standards
 

3 Most Common Threats Of Information Security

Hinweis der Redaktion

  1. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms. Computer security can focus on ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer.
  2. A rootkit is malware which consists of a program (or combination of several programs) designed to take fundamental control (in Unix terms "root" access, in Windows terms, "Administrator" or "Admin" access) of a computer system, without authorization by the system's owners and legitimate managers
  3. A denial-of-service attack ( DoS attack ) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted, malevolent efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even DNS root servers . Loss of confidentiality E-mails are sent in clear over open networks E-mails stored on potentially insecure clients and mail servers Loss of integrity No integrity protection on e-mails; body can be altered in transit or on mail server
  4. POP, IMAP over ssh, SSL – protokoli PGP – enkripcija I dekripcija
  5. Viruses Programs that can be attached to emails and are spread as files from individual to individual. Viruses are intentionally destructive Worms Self replicating computers programs, similar to computer viruses however do not require other programs or documents to spread. Trojans non-replicating malicious programs which appears harmless or even useful to the user but when executed harms the user’s System Spyware Programs installed on computers which record and send your personal information – includes marketing info( visited sites, lists of your software, your interests ,etc…) Phishing attempt to fraudulently acquire sensitive information, such as password and financial information, through email or an instant message
  6. In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. A social engineer runs what used to be called a "con game". Social Engineering is clever manipulation of the natural human tendency to trust. As a rule, public sector employees care about the jobs they do and try their best to be helpful. “ Social engineering attacks are mostly financially driven, with the attacker looking to obtain confidential information. Some of the common tactics used for such attacks are forging identities, exploiting the inability of people to realize the value of the data held by them or the know-how to protect data. Most users perceive a false sense of security once they install an anti-virus or anti spam solution. That’s why along with providing security solutions, we look to educate our customers on the various current and evolving security threats that take place and how to be immune from them.” said Govind Rammurthy CEO, MicroWorld.