SlideShare a Scribd company logo
1 of 13
THREATS
TO
INFORMATION
RESOURCES
Shimna K
3rd Sem MBA
CMS
Information Systems (IS)
An information system(IS) is typically considered to be a set of
interrelated elements or components that
collect(input), manipulate(processes), and disseminate (output)
data and information and provide a feedback mechanism to meet
an objective.

Information Systems Security
It refers to the policies, procedures, and technical measures
adopted to prevent potential threats to IS resources.
IS Security Threats
A threat to an information resource is any danger
to which a system may be exposed.
•
•
•
•
•
•

Human errors or failures
Manipulation of data/systems
Theft of data/system
Destruction from virus
Technical; failure/errors of systems
Natural disasters like
flood, fire, earthquake, etc
1. Human Errors or Failures
Unintentional errors
Entry of wrong data
Accidental deletion
Modification of data
Storage of data in unprotected areas like desktop, website, trash bin
Disclosing of confidential data
These errors may happen because of;

Lack of experience
Improper training
2. Manipulation of data/systems
This category of threats happens because of Deliberate
acts to harm the data or IS of an organization.
An unauthorized individual gains an access to the
private/confidential or important data of an organization.
Intentionally do some wrong acts like delete, corrupt or
steal the data.
3. Theft of data/systems
It is a deliberate attempt of some person to steal the
important data of an organization.
Thieves may steal physical items like entire pc, circuit
boards & memory chips, the theft of electronic data pose
a greater challenge.
Telecommunication networks are highly misused by
computer experts.
The person who intercepts the communication lines to
steal data without the knowledge of the owner of the
data is known as hacker.
4. Destruction from virus
Deliberate software attack

This kind of attack happens when a person or a group write
software to attack data or IS of and organization with the
purpose to damage, destroy, or deny service to the target
systems.
The programme which is written with an intent to attack
data or IS is known as malicious code or malicious
software or malware.
Eg: viruses and worms, Trojan horses, logic-bombs etc.
The computer viruses are the secret instructions inserted into
programs or data that run during ordinary tasks. The secret
instructions may destroy or alter data as well as spread within or
between computer systems.

Worms refers to a program which replicates itself constantly
and penetrates a valid computer system.
Trojan horses refers to illegal programs contained within
another useful or beneficial program, that hide their true nature
or sleeps until some specific event occurs hen triggers the
illegal program becomes infected which is not known to
the user. Many viruses can be hidden in Trojan horses,
but Trojan horses do no have the ability to replicate
themselves.
Logic bombs or time bomb is a kind of programme that executes
when certain conditions are met. It is similar to Trojan horse in its
ability to damage data but it activates at a particular time.
5. Technical failure/ errors of systems
Manufacturing defects in the hardware or the hidden faults in the
software.
Unique combinations of certain software and hardware may give
new errors.
Technological obsolescence.
6. Natural disasters
Not because of unintentional or deliberate acts.
Threats include fire, flood, earthquake, lightning etc.
REFERENCE
MIS, DP GOYAL
INTERNET
Threats to Information Resources - MIS - Shimna

More Related Content

What's hot

IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threatsisc2dfw
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Lecture 1 accounting information system, an overview
Lecture 1  accounting information system, an overviewLecture 1  accounting information system, an overview
Lecture 1 accounting information system, an overviewHabib Ullah Qamar
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 

What's hot (20)

Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Payment fraud
Payment fraudPayment fraud
Payment fraud
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Phishing
PhishingPhishing
Phishing
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Computer security and
Computer security andComputer security and
Computer security and
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Lecture 1 accounting information system, an overview
Lecture 1  accounting information system, an overviewLecture 1  accounting information system, an overview
Lecture 1 accounting information system, an overview
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Computer crime
Computer crimeComputer crime
Computer crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 

Viewers also liked

Top 10 Reasons for ERP Project Failure
Top 10 Reasons for ERP Project FailureTop 10 Reasons for ERP Project Failure
Top 10 Reasons for ERP Project FailureJohn Paulson
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Chapter 6 Mis And Erp
Chapter 6 Mis And ErpChapter 6 Mis And Erp
Chapter 6 Mis And Erpmanagement 2
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Customer relationship management in mis ppt
Customer relationship management in mis pptCustomer relationship management in mis ppt
Customer relationship management in mis pptRanjani Witted
 
MIS 13 Customer Relationship Management
MIS 13 Customer Relationship ManagementMIS 13 Customer Relationship Management
MIS 13 Customer Relationship ManagementTushar B Kute
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Porter's Value Chain Presentation 1
Porter's Value Chain Presentation 1Porter's Value Chain Presentation 1
Porter's Value Chain Presentation 1Bryant Pham
 
Basics of Supply Chain Managment
Basics of Supply Chain ManagmentBasics of Supply Chain Managment
Basics of Supply Chain ManagmentYoussef Serroukh
 
Customer Relationship Management (CRM)
Customer Relationship Management (CRM)Customer Relationship Management (CRM)
Customer Relationship Management (CRM)Jaiser Abbas
 
Value chain analysis
Value chain analysisValue chain analysis
Value chain analysisMonish rm
 

Viewers also liked (20)

Top 10 Reasons for ERP Project Failure
Top 10 Reasons for ERP Project FailureTop 10 Reasons for ERP Project Failure
Top 10 Reasons for ERP Project Failure
 
ERP and MIS
ERP and MISERP and MIS
ERP and MIS
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Erp benefits
Erp benefitsErp benefits
Erp benefits
 
Chapter 6 Mis And Erp
Chapter 6 Mis And ErpChapter 6 Mis And Erp
Chapter 6 Mis And Erp
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Customer relationship management in mis ppt
Customer relationship management in mis pptCustomer relationship management in mis ppt
Customer relationship management in mis ppt
 
MIS 13 Customer Relationship Management
MIS 13 Customer Relationship ManagementMIS 13 Customer Relationship Management
MIS 13 Customer Relationship Management
 
DATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MININGDATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MINING
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
OLAP
OLAPOLAP
OLAP
 
Warehousing
WarehousingWarehousing
Warehousing
 
CRM with MIS
CRM with MISCRM with MIS
CRM with MIS
 
Porter's Value Chain Presentation 1
Porter's Value Chain Presentation 1Porter's Value Chain Presentation 1
Porter's Value Chain Presentation 1
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Basics of Supply Chain Managment
Basics of Supply Chain ManagmentBasics of Supply Chain Managment
Basics of Supply Chain Managment
 
Customer Relationship Management (CRM)
Customer Relationship Management (CRM)Customer Relationship Management (CRM)
Customer Relationship Management (CRM)
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain Management
 
Value chain analysis
Value chain analysisValue chain analysis
Value chain analysis
 

Similar to Threats to Information Resources - MIS - Shimna

Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityAliyuMuhammadButu
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
Health information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskHealth information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskDr. Lasantha Ranwala
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Komal Mehfooz
 
Threat vs risk vs attack vs Asset vs vulnerability
Threat vs risk vs attack vs Asset vs  vulnerability Threat vs risk vs attack vs Asset vs  vulnerability
Threat vs risk vs attack vs Asset vs vulnerability Osama Ellahi
 
Cyber security
Cyber securityCyber security
Cyber securitygogulraj25
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Computer Threat.pdf
Computer Threat.pdfComputer Threat.pdf
Computer Threat.pdfZaraFatima29
 

Similar to Threats to Information Resources - MIS - Shimna (20)

Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
Need for security
Need for securityNeed for security
Need for security
 
Computer security
Computer securityComputer security
Computer security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
System tThreats
System tThreatsSystem tThreats
System tThreats
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Health information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskHealth information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and risk
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Threat vs risk vs attack vs Asset vs vulnerability
Threat vs risk vs attack vs Asset vs  vulnerability Threat vs risk vs attack vs Asset vs  vulnerability
Threat vs risk vs attack vs Asset vs vulnerability
 
Cyber security
Cyber securityCyber security
Cyber security
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Computer Threat.pdf
Computer Threat.pdfComputer Threat.pdf
Computer Threat.pdf
 

Recently uploaded

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 

Recently uploaded (20)

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 

Threats to Information Resources - MIS - Shimna

  • 2. Information Systems (IS) An information system(IS) is typically considered to be a set of interrelated elements or components that collect(input), manipulate(processes), and disseminate (output) data and information and provide a feedback mechanism to meet an objective. Information Systems Security It refers to the policies, procedures, and technical measures adopted to prevent potential threats to IS resources.
  • 3. IS Security Threats A threat to an information resource is any danger to which a system may be exposed. • • • • • • Human errors or failures Manipulation of data/systems Theft of data/system Destruction from virus Technical; failure/errors of systems Natural disasters like flood, fire, earthquake, etc
  • 4. 1. Human Errors or Failures Unintentional errors Entry of wrong data Accidental deletion Modification of data Storage of data in unprotected areas like desktop, website, trash bin Disclosing of confidential data These errors may happen because of; Lack of experience Improper training
  • 5. 2. Manipulation of data/systems This category of threats happens because of Deliberate acts to harm the data or IS of an organization. An unauthorized individual gains an access to the private/confidential or important data of an organization. Intentionally do some wrong acts like delete, corrupt or steal the data.
  • 6. 3. Theft of data/systems It is a deliberate attempt of some person to steal the important data of an organization. Thieves may steal physical items like entire pc, circuit boards & memory chips, the theft of electronic data pose a greater challenge. Telecommunication networks are highly misused by computer experts. The person who intercepts the communication lines to steal data without the knowledge of the owner of the data is known as hacker.
  • 7. 4. Destruction from virus Deliberate software attack This kind of attack happens when a person or a group write software to attack data or IS of and organization with the purpose to damage, destroy, or deny service to the target systems. The programme which is written with an intent to attack data or IS is known as malicious code or malicious software or malware. Eg: viruses and worms, Trojan horses, logic-bombs etc.
  • 8. The computer viruses are the secret instructions inserted into programs or data that run during ordinary tasks. The secret instructions may destroy or alter data as well as spread within or between computer systems. Worms refers to a program which replicates itself constantly and penetrates a valid computer system. Trojan horses refers to illegal programs contained within another useful or beneficial program, that hide their true nature or sleeps until some specific event occurs hen triggers the illegal program becomes infected which is not known to the user. Many viruses can be hidden in Trojan horses, but Trojan horses do no have the ability to replicate themselves.
  • 9. Logic bombs or time bomb is a kind of programme that executes when certain conditions are met. It is similar to Trojan horse in its ability to damage data but it activates at a particular time.
  • 10. 5. Technical failure/ errors of systems Manufacturing defects in the hardware or the hidden faults in the software. Unique combinations of certain software and hardware may give new errors. Technological obsolescence.
  • 11. 6. Natural disasters Not because of unintentional or deliberate acts. Threats include fire, flood, earthquake, lightning etc.