You are on page 1of 5

Additional Security Challenges

Spam
and spim

Cookies Hoaxes

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 16
All rights reserved.
Risks, Threats, Vulnerabilities

•Probability that something bad is going to


Risk happen to an asset

•Any action that can damage or compromise


Threat an asset

•An inherent weakness that may enable threats


Vulnerability to harm system or networks

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 17
All rights reserved.
Most Common Threats
Malicious software
Hardware or software failure
Internal attacker
Equipment theft
External attacker
Natural disaster
Industrial espionage
Terrorism

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 18
All rights reserved.
Threat Types
Disclosure • Sabotage
threats • Espionage

Alteration
threats • Unauthorized changes

Denial or
destruction • DoS attack
threats

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 19
All rights reserved.
What Is a Malicious Attack?

Fabrications

Four Interceptions
categories of
attacks Interruptions

Modifications

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 20
All rights reserved.

You might also like