SlideShare a Scribd company logo
1 of 21
WHAT IS INFORMATION ?
• Information is a complete set of data.
• It can be called as processed data.
WHAT IS INFORMATION
SECURITY ?
• It is protection of information
systems and hardware that
use, store and transit the
information.

• Security is the quality or state of
information

• Security is always multilayered :
Physical Security
Personal Security
Operations Security
Communications Security
THREATS TO INFORMATION
SECURITY
•

A threat is an object, person, or other entity that
represents a constant danger to an asset.

• The Management should ensure that information is
given sufficient protection through policies, proper
training and proper equipment.

• Consistent reviews andBetter information security
can be provided by recognizing and ranking the
threats to the information.

•

Checks also help and Surveys also help in keeping
information safe
TYPES OF THREATS TO
INFORMATION
• Inadvertent Acts
• Deliberate Acts
• Natural Disaster (Natural Forces)
• Technical Failures
• Management Failure
INADVERTENT ACTS
• These are the acts that happen by mistake. They
are not deliberate

• The attacker does not have any ill will or malicious
intent or his attack is not proven in categories of
theft.

• Acts of Human error and failure, Deviation from
service quality, communication error, are examples
of inadvertent acts
DELIBERATE ACTS
• These acts are done by people of organizations to
harm the information.

• The attackers have a malicious intent and wish to
steal or destroy the data.

• Acts of espionage, Hacking, Cracking, come under
deliberate acts.
NATURAL DISASTERS
• Forces of nature are dangerous because they are
unexpected and come without very little warning.

• They disrupt lives of individuals but also causes
damage to information that is stored within
computers.

• These threats can be avoided but he management
must have the necessary precautions.
TECHNICAL FAILURES
• Technical failures are classified into two types :
• Technical Hardware Failure
• Technical Software Failure

• Technical Hardware Failure: It occurs when
manufacturer distributes equipment with flaws that
may be known or unknown to the manufacturer

• Technical Software Failure: These can cause the
system to perform in an undesirable or unexpected
way. Some of these are unrecoverable while some
occur periodically
MANAGEMENT FAILURE

• Management must always be updated
about recent developments and
technology.

• Proper planning must be done by the
management for good protection of the
information.

• IT professionals must help the
management in protecting the
information, by helping the
management upgrade to the latest
technology.
MALWARE
• It is any malicious software designed to harm a
computer without the user’s consent.

• Eg. VIRUS, Worm, Trojan, Spyware
VIRUS (VITAL INFORMATION
RESOURCE UNDER SIEGE )
• It is a computer program designed to copy itself and
attach itself to other files stored on a computer.

• It moves from computer to computer through by
attaching itself to files or boot records of disks.

• It can be sent through a network or a removable
storage device.
WORM
• Worm is a self replicating computer program that
uses a network to send copies of itself to other
computers on the network.

• It replicates ad eats up the computer storage.
• An example is Voyager Worm
TROJAN HORSE
• They appear to be harmless but secretly gather
information about the user.

• They upload hidden and malicious programs on the
computer without the user’s knowledge.

• It does not attempt to inject itself into other files
unlike computer virus.
SPYWARE
• It secretly monitors internet surfing habits without
user’s knowledge.

• They perform actions like advertising vague
products and changing computer configurations.
These actions are very troublesome.

• They usually do not replicate themselves.
PROTECTION AGAINST
MALWARE
• Make sure that you have updated operating system
and antivirus software. Eg. McAfee

• Do not use pirated software, or download files from
unreliable sources.

• Perform regular hard drive scans.
• Use licensed software
HACKING
• Hacking means finding out weaknesses in a
computer or a network and exploiting them.

• Hackers are usually motivated by profit, protest or
challenge.
HACKER
• He/She is a person who enjoys the challenge of
breaking into computers without the knowledge of
the user.

• Their main aim might be to know the detail of a
programmable system and how it works.

• Hackers are experts who see new ways to use
computers.
CRACKER
• These people crack or remove the protection
mechanism of a computer system.

• Their main aim is to steal or destroy information
without the users consent

• They are much more dangerous than hackers.
ANTIVIRUS
• It is a software used to prevent, detect and remove
malware.

• It runs in the background at all times.
• It should be kept updated.
• It runs computer disk scans periodically.
• Eg. McAfee, Norton, Kaspersky.
Threats to information security

More Related Content

What's hot

Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptShruthi48
 
Program security
Program securityProgram security
Program securityG Prachi
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Web application attacks
Web application attacksWeb application attacks
Web application attackshruth
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Securitychauhankapil
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating systemAbou Bakr Ashraf
 

What's hot (20)

System security
System securitySystem security
System security
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.ppt
 
System security
System securitySystem security
System security
 
Database security
Database securityDatabase security
Database security
 
Program security
Program securityProgram security
Program security
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
Software Evolution
Software EvolutionSoftware Evolution
Software Evolution
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Email security
Email securityEmail security
Email security
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 

Viewers also liked

TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Top 10 Reasons for ERP Project Failure
Top 10 Reasons for ERP Project FailureTop 10 Reasons for ERP Project Failure
Top 10 Reasons for ERP Project FailureJohn Paulson
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaChinnu Shimna
 
Chapter 6 Mis And Erp
Chapter 6 Mis And ErpChapter 6 Mis And Erp
Chapter 6 Mis And Erpmanagement 2
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Customer relationship management in mis ppt
Customer relationship management in mis pptCustomer relationship management in mis ppt
Customer relationship management in mis pptRanjani Witted
 
MIS 13 Customer Relationship Management
MIS 13 Customer Relationship ManagementMIS 13 Customer Relationship Management
MIS 13 Customer Relationship ManagementTushar B Kute
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Porter's Value Chain Presentation 1
Porter's Value Chain Presentation 1Porter's Value Chain Presentation 1
Porter's Value Chain Presentation 1Bryant Pham
 
Basics of Supply Chain Managment
Basics of Supply Chain ManagmentBasics of Supply Chain Managment
Basics of Supply Chain ManagmentYoussef Serroukh
 
Customer Relationship Management (CRM)
Customer Relationship Management (CRM)Customer Relationship Management (CRM)
Customer Relationship Management (CRM)Jaiser Abbas
 

Viewers also liked (20)

ERP and MIS
ERP and MISERP and MIS
ERP and MIS
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Top 10 Reasons for ERP Project Failure
Top 10 Reasons for ERP Project FailureTop 10 Reasons for ERP Project Failure
Top 10 Reasons for ERP Project Failure
 
Erp benefits
Erp benefitsErp benefits
Erp benefits
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
Chapter 6 Mis And Erp
Chapter 6 Mis And ErpChapter 6 Mis And Erp
Chapter 6 Mis And Erp
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Customer relationship management in mis ppt
Customer relationship management in mis pptCustomer relationship management in mis ppt
Customer relationship management in mis ppt
 
MIS 13 Customer Relationship Management
MIS 13 Customer Relationship ManagementMIS 13 Customer Relationship Management
MIS 13 Customer Relationship Management
 
DATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MININGDATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MINING
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
OLAP
OLAPOLAP
OLAP
 
Warehousing
WarehousingWarehousing
Warehousing
 
CRM with MIS
CRM with MISCRM with MIS
CRM with MIS
 
Porter's Value Chain Presentation 1
Porter's Value Chain Presentation 1Porter's Value Chain Presentation 1
Porter's Value Chain Presentation 1
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Basics of Supply Chain Managment
Basics of Supply Chain ManagmentBasics of Supply Chain Managment
Basics of Supply Chain Managment
 
Customer Relationship Management (CRM)
Customer Relationship Management (CRM)Customer Relationship Management (CRM)
Customer Relationship Management (CRM)
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain Management
 

Similar to Threats to information security

Threats to information security
Threats to information securityThreats to information security
Threats to information securityarun alfie
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).pptGooglePay16
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Malware and different types of malwares.
Malware and different types of malwares.Malware and different types of malwares.
Malware and different types of malwares.SangishettyDikshitha
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)Zara Nawaz
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & ControlAdetula Bunmi
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxmahaliacaraan
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMANAND MURALI
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 

Similar to Threats to information security (20)

Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Security.pdf
Security.pdfSecurity.pdf
Security.pdf
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Malware and different types of malwares.
Malware and different types of malwares.Malware and different types of malwares.
Malware and different types of malwares.
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Ch1 cse
Ch1 cseCh1 cse
Ch1 cse
 
Information security
Information securityInformation security
Information security
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 

Recently uploaded

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Threats to information security

  • 1.
  • 2. WHAT IS INFORMATION ? • Information is a complete set of data. • It can be called as processed data.
  • 3. WHAT IS INFORMATION SECURITY ? • It is protection of information systems and hardware that use, store and transit the information. • Security is the quality or state of information • Security is always multilayered : Physical Security Personal Security Operations Security Communications Security
  • 4. THREATS TO INFORMATION SECURITY • A threat is an object, person, or other entity that represents a constant danger to an asset. • The Management should ensure that information is given sufficient protection through policies, proper training and proper equipment. • Consistent reviews andBetter information security can be provided by recognizing and ranking the threats to the information. • Checks also help and Surveys also help in keeping information safe
  • 5. TYPES OF THREATS TO INFORMATION • Inadvertent Acts • Deliberate Acts • Natural Disaster (Natural Forces) • Technical Failures • Management Failure
  • 6. INADVERTENT ACTS • These are the acts that happen by mistake. They are not deliberate • The attacker does not have any ill will or malicious intent or his attack is not proven in categories of theft. • Acts of Human error and failure, Deviation from service quality, communication error, are examples of inadvertent acts
  • 7. DELIBERATE ACTS • These acts are done by people of organizations to harm the information. • The attackers have a malicious intent and wish to steal or destroy the data. • Acts of espionage, Hacking, Cracking, come under deliberate acts.
  • 8. NATURAL DISASTERS • Forces of nature are dangerous because they are unexpected and come without very little warning. • They disrupt lives of individuals but also causes damage to information that is stored within computers. • These threats can be avoided but he management must have the necessary precautions.
  • 9. TECHNICAL FAILURES • Technical failures are classified into two types : • Technical Hardware Failure • Technical Software Failure • Technical Hardware Failure: It occurs when manufacturer distributes equipment with flaws that may be known or unknown to the manufacturer • Technical Software Failure: These can cause the system to perform in an undesirable or unexpected way. Some of these are unrecoverable while some occur periodically
  • 10. MANAGEMENT FAILURE • Management must always be updated about recent developments and technology. • Proper planning must be done by the management for good protection of the information. • IT professionals must help the management in protecting the information, by helping the management upgrade to the latest technology.
  • 11. MALWARE • It is any malicious software designed to harm a computer without the user’s consent. • Eg. VIRUS, Worm, Trojan, Spyware
  • 12. VIRUS (VITAL INFORMATION RESOURCE UNDER SIEGE ) • It is a computer program designed to copy itself and attach itself to other files stored on a computer. • It moves from computer to computer through by attaching itself to files or boot records of disks. • It can be sent through a network or a removable storage device.
  • 13. WORM • Worm is a self replicating computer program that uses a network to send copies of itself to other computers on the network. • It replicates ad eats up the computer storage. • An example is Voyager Worm
  • 14. TROJAN HORSE • They appear to be harmless but secretly gather information about the user. • They upload hidden and malicious programs on the computer without the user’s knowledge. • It does not attempt to inject itself into other files unlike computer virus.
  • 15. SPYWARE • It secretly monitors internet surfing habits without user’s knowledge. • They perform actions like advertising vague products and changing computer configurations. These actions are very troublesome. • They usually do not replicate themselves.
  • 16. PROTECTION AGAINST MALWARE • Make sure that you have updated operating system and antivirus software. Eg. McAfee • Do not use pirated software, or download files from unreliable sources. • Perform regular hard drive scans. • Use licensed software
  • 17. HACKING • Hacking means finding out weaknesses in a computer or a network and exploiting them. • Hackers are usually motivated by profit, protest or challenge.
  • 18. HACKER • He/She is a person who enjoys the challenge of breaking into computers without the knowledge of the user. • Their main aim might be to know the detail of a programmable system and how it works. • Hackers are experts who see new ways to use computers.
  • 19. CRACKER • These people crack or remove the protection mechanism of a computer system. • Their main aim is to steal or destroy information without the users consent • They are much more dangerous than hackers.
  • 20. ANTIVIRUS • It is a software used to prevent, detect and remove malware. • It runs in the background at all times. • It should be kept updated. • It runs computer disk scans periodically. • Eg. McAfee, Norton, Kaspersky.