1. The document discusses computer security threats such as errors and omissions, fraud and theft, employee sabotage, loss of infrastructure, malicious hackers, and industrial espionage.
2. It also covers the goals of security policies to protect against these threats, which include identifying security risks, restricting access to sensitive data and systems, and establishing protocols for backups and disaster recovery.
3. The learning outcomes are to identify basic security components, explain threats and the goals of security policies, and design security policies.
1. The document discusses computer security threats such as errors and omissions, fraud and theft, employee sabotage, loss of infrastructure, malicious hackers, and industrial espionage.
2. It also covers the goals of security policies to protect against these threats, which include identifying security risks, restricting access to sensitive data and systems, and establishing protocols for backups and disaster recovery.
3. The learning outcomes are to identify basic security components, explain threats and the goals of security policies, and design security policies.
1. The document discusses computer security threats such as errors and omissions, fraud and theft, employee sabotage, loss of infrastructure, malicious hackers, and industrial espionage.
2. It also covers the goals of security policies to protect against these threats, which include identifying security risks, restricting access to sensitive data and systems, and establishing protocols for backups and disaster recovery.
3. The learning outcomes are to identify basic security components, explain threats and the goals of security policies, and design security policies.
LEARNING OUTCOMES: At the end of the session, the students should be able to: 1. Identify basic components of computer security 2. Explain and discuss threats, goals of security policy under computer security 3. Designed or create security policy Basic Component of Computer Security Basic Component of Computer Security continue …… THREATS Continue……… Continue……. Continue……… Continue……… • Error and Omission - Errors and omissions are an important threat to data and system integrity. These errors are caused not only by data entry clerks processing hundreds of transactions per day, but also by all types of users who create and edit data. • Fraud and Theft - Computer systems can be exploited for both fraud and theft both by "automating" traditional methods of fraud and by using new methods. • Employee sabotage - Employees are most familiar with their employer's computers and applications, including knowing what actions might cause the most damage, mischief, or sabotage. Continue……… • Loss of Physical Infrastructure support - The loss of supporting infrastructure includes power failures (outages, spikes, and brownouts), loss of communications, water outages and leaks, sewer problems, lack of transportation services, fire, flood, civil unrest, and strikes.
• Malicious Hackers - The term malicious hackers, sometimes called crackers,
refers to those who break into computers without authorization.
• Industrial Espionage- is the act of gathering proprietary data from private
companies or thegovernment34 for the purpose of aiding another company(ies). Industrial espionage can be perpetrated either by companies seeking to improve their competitive advantage or by governments seeking to aid their domestic industries. Security Policies Continue…….. Continue…… Continue……. Risk identification continue…….. Risk identification continue…….. Continue……. Continue……. Continue……. Continue……. Continue……. THANK YOU!!!!!!!