Professional Documents
Culture Documents
LEARNING OUTCOMES
• Threats
• Include sharing passwords with coworkers, leaving a computer unattended
while logged on to the network, or even spilling coffee on a keyboard
ICT-ED INSTITUTE OF SCIENCE AND TECHNOLOGY INC.
Innovation for Quality Education
• Confidentiality
• System must not allow disclosing information to anyone who isn’t authorized
to access it
• Secure government agencies
• Businesses
• E-commerce
ICT-ED INSTITUTE OF SCIENCE AND TECHNOLOGY INC.
Innovation for Quality Education
• Integrity
• Ensures the accuracy of information resources in an organization
• Financial transactions
• Availability
• Ensures that computers and networks are operating
• Authorized users can access the information they need
ICT-ED INSTITUTE OF SCIENCE AND TECHNOLOGY INC.
Innovation for Quality Education
INTENTIONAL THREATS
• Viruses
• Worms
• Trojan programs
• Logic bombs
• Backdoors
• Blended threats (e.g., worm launched by Trojan)
• Denial-of-service attacks
• Social engineering
ICT-ED INSTITUTE OF SCIENCE AND TECHNOLOGY INC.
Innovation for Quality Education
• Train employees
• Guidelines and steps involved:
• People
• Procedures
• Equipment and technology
ICT-ED INSTITUTE OF SCIENCE AND TECHNOLOGY INC.
Innovation for Quality Education
SUMMARY
• Types of threat
• Basic safeguards
• Biometric
• Nonbiometric
• Fault tolerance
• Establish comprehensive security system and business continuity plan
ICT-ED INSTITUTE OF SCIENCE AND TECHNOLOGY INC.
Innovation for Quality Education