You are on page 1of 4

INFORMATION SYSTEM SECURITY  Confidentiality Seven domains of a typical IT infrastructure

The protection of information systems against When protecting information, we want to be able  User Domain
unauthorized access to or modification of to restrict access to those who are allowed to see This domain includes any end-user accessing
information, whether in storage, processing or it; everyone else should be disallowed from information at the organization.
transit, and against the denial of service to learning anything about its contents.  Workstation domain
authorized users, including those measures  Integrity The Workstation Domain includes any computing
necessary to detect, document, and counter Integrity is the assurance that the information devices used by end-users and represents how the
such threats. being accessed has not been altered and truly users connect to the actual IT infrastructure.
represents what is intended.  LAN domain
The 3 Information Security Triad:  Availability The LAN Domain includes all the equipment that
 Confidentiality Availability means that information can be makes up the local area network, including
 Integrity accessed and modified by anyone authorized to do switches, hubs, access points and WiFi, and
 Availability (CIA) so in an appropriate timeframe. routers.
 LAN to WAN domain
The LAN-to-WAN Domain is where the corporate
LAN connects to the Internet (in this case, the
WAN).

E-Business Models with e-Commerce Strategy  WAN domain


E-commerce is a key component of e-business, Internet of Things (IoT) The WAN Domain is represented by the Internet
The Internet of Things (IoT) is a network of physical and stands for wide area network.
and there are several e-business models that objects with sensors, software, and connectivity  Remote access domain
companies can adopt to drive their e- capabilities that collect and exchange data over the The Remote Access Domain is represented by any
internet. These objects can be everyday devices, employee, vendor, or contractor that works in the
commerce strategy. Here are some of the most
field or from home, instead of within the office
popular e-business models: machines, vehicles, appliances, or people with
environment, and accesses the corporate LAN.
unique identifiers.  System and application domains
. Business to Consumer (B2C): This is
Impact of IoT in Human and Business Life The System/Application Domain includes all system
the most common e-commerce  Enhanced Connectivity and application software-related issues.
model, where businesses sell  Improved Efficiency IT security framework
products or services directly to  Data-driven Insights An IT security framework is a series of documented
 Enhanced Safety and Security processes that define policies and procedures
consumers through online platforms. around the implementation and ongoing
 Healthcare and Well-being
Examples include Amazon, Alibaba, management of information security controls.
 Smart Transportation These frameworks are a blueprint for managing risk
and eBay.
 Business Opportunities and reducing vulnerabilities. Frameworks provide a
. Business to Business (B2B): This starting point for establishing processes, policies
model involves businesses selling to and administrative activities for information
security management.
other businesses through online
marketplaces or platforms. Examples
include Alibaba, ThomasNet, and
TradeKey.
 Consumer to Consumer (C2C): This model Several e-commerce strategies that companies can  Subscription: This strategy involves offering
involves individuals selling products or adopt to drive sales and growth: products or services on a recurring basis, such
services to other individuals through  Direct-to-consumer (DTC): This strategy as monthly or annual subscriptions, to
online platforms. Examples include eBay, involves companies selling products or services generate predictable and recurring revenue.
Craigslist, and Etsy. directly to consumers through their own  Marketplace: This strategy involves creating
 Consumer to Business (C2B): This model online stores, rather than through third-party an online platform where multiple sellers can
involves individuals selling products or retailers. offer their products or services to customers.
services to businesses through online  Omnichannel: This strategy involves Examples include Amazon Marketplace, Etsy,
platforms. Examples include Upwork, integrating various channels (such as online, and eBay.
Fiverr, and Freelancer. mobile, brick-and-mortar, and social media) to  Personalization: This strategy involves
 Business to Administration (B2A): This create a seamless shopping experience for tailoring the shopping experience to individual
model involves businesses providing customers. customers based on their preferences,
products or services to government behaviors, and purchase history to increase
agencies or institutions through online engagement and retention.
platforms. Examples include GSA
Advantage, FedBid, and eBuy.

IP Mobility
IP mobility refers to the ability of a device, like a smartphone or Malicious Attacks, Threats and Impact in the IT
 Spyware
laptop, to move between different networks or locations while Infrastructure
maintaining a continuous and stable internet connection. Malicious Attacks Collects user activity data without their knowledge.
Challenges Created by IoT Encompasses many specific types of attacks such as Worms
● Security Concerns: IoT devices can be vulnerable to
ransomware, spyware, command and control, and more.
Malware Spreads through a network by replicating itself
hacking, leading to privacy breaches and potential
Short for malicious software, is a term that encompasses Target vulnerabilities in operating systems to install
misuse of data.
● Interoperability Issues: Devices from different any software designed with the intent to cause harm to a themselves into networks.
manufacturers may use different standards, making user’s computer, server, or network.  Bots
it challenging for them to communicate effectively.
Types of Malware: Launches a broad flood of attacks
● Data Privacy: The vast amount of data generated by
 Ransomware A software application that performs automated tasks on
IoT devices raises concerns about how this data is
collected, stored, and used, often without users' full Disables victim's access to data until ransom is paid. command.
awareness or consent. Is software that uses encryption to disable a target’s  Adware
● Scalability: As the number of connected devices Serves unwanted advertisements
access to its data until a ransom is paid.
increases, managing and scaling the infrastructure
 Keyloggers That information can be shared or sold to advertisers
becomes complex and may require significant
resources. Monitors users' keystrokes without the user’s consent
● Reliability: IoT devices need to be dependable to Tools that record what a person types on a device.  Trojans
ensure their proper functioning, especially in critical Disguises itself as desirable code
 Fileless Malware
applications like healthcare or industrial systems.
Makes changes to files that are native to the OS  Rootkits
● Power Consumption: Many IoT devices operate on
battery power, so optimizing energy efficiency is It makes changes to files that are native to the operating Gives hackers remote control of a victim's device.
crucial to extend their lifespan and reduce system, such as PowerShell or WMI.
environmental impact.
 Mobile Malware  Botnets  ransomware attack
Infects mobile devices a collection of Internet-connected devices, including PCs, the victim's computer is locked, typically by encryption,
mobile devices, servers and IoT devices that are infected which keeps the victim from using the device or data
 Wiper Malware and remotely controlled by a common type of malware. that's stored on it.
Erases user data beyond recoverability  Drive-by download attacks  Exploit kits
In a drive-by download attack, malicious code is a programming tool that enables a person without any
A wiper is a type of malware with a single purpose: to
downloaded from a website via a browser, application or experience writing software code to create, customize
erase user data and ensure it can’t be recovered. integrated operating system without a user's permission and distribute malware.
Threats or knowledge.  Advanced persistent threat attacks
Threat is a malicious act that aims to corrupt or steal  Phishing attacks An advanced persistent threat (APT) is a targeted
data or disrupt an organization's systems or the entire type of information security threat that employs social cyberattack in which an unauthorized intruder penetrates
organization. engineering to trick users into breaking normal security a network and remains undetected for an extended
 Insider threats practices and giving up confidential information, including period of time.
An insider threat occurs when individuals close to an names, addresses, login credentials, Social Security  Malvertising
organization who have authorized access to its network numbers, credit card information and other financial technique cybercriminals use to inject malicious code into
intentionally or unintentionally misuse that access to information legitimate online advertising networks and web pages.
negatively affect the organization's critical data or  Distributed denial-of-service (DDoS) attacks
systems. multiple compromised machines attack a target, such as a
 Viruses and worms server, website or other network resource, making the
malicious software programs (malware) aimed at target totally inoperable.
destroying an organization's systems, data and network.

Information systems security: its effect on people and RISKS AND VULNERABILITIES
businesses  Cloud security. Risk management
Information security This approach is geared toward securing, building and the process of identifying, analyzing, evaluating, and
Information security covers the tools and processes that hosting apps in the cloud. treating the potential or actual threats to an
organizations use to protect information.  Cryptography. organization’s objectives, assets, or stakeholders.
Types of information security Cryptography is the process of converting plaintext data Approaches of Risk Management
 Application security into secure data by encrypting it.  Risk avoidance
This infosec approach is designed for safeguarding • Vulnerability management This approach aims to eliminate or reduce the exposure
applications and application programming interfaces. It Every year, thousands of new vulnerabilities are to risks by avoiding the activities or decisions that create
stops and blocks vulnerabilities and data breaches from discovered that require organizations to patch their them
affecting applications. operating systems and applications and reconfigure the  Risk transfer
 Infrastructure security security settings of their network This approach involves shifting the responsibility or
Infrastructure security focuses on safeguarding intranet • Incident response plan burden of risks to another party, such as an insurer, a
and extranet networks, as well as labs, data centers, An incident response plan is a set of information security contractor, or a partner.
servers, desktop computers, cloud assets and mobile processes that are used to identify, contain and recover  Risk retention
devices. from security breaches. This approach accepts the risks and bears the
consequences, either voluntarily or involuntarily.
 Risk reduction
This approach attempts to minimize the likelihood or
impact of risks by implementing controls, mitigation
strategies, or contingency plans.
 Risk sharing
This approach distributes the risks among multiple
parties, such as stakeholders, customers, or suppliers.
Some examples of common IT risks are: Some possible impacts are: Weaknesses in OT Environments
• Data breaches: unauthorized access to • Financial losses: costs of 1. Lack of Network Segmentation
sensitive or confidential information,
such as personal, financial or health data. recovery, investigation, legal fees, 2. DDoS Attacks
• Ransomware: malicious software that fines, compensation, etc. 3. Web Application Attacks
encrypts your files or systems and • Reputation damage: loss of trust, 4. Malware
demands a ransom for their decryption. credibility, customer loyalty, 5. Command Injection
• Phishing: fraudulent emails or messages
that trick users into revealing their
brand value, etc. 6. Parameters Manipulation
credentials or clicking on malicious links • Operational disruption:
or attachments. downtime, delays, errors,
• Denial-of-service: attacks that inefficiencies, etc.
overwhelm your network or servers with • Regulatory compliance: violations
traffic or requests, preventing legitimate
users from accessing your services or of laws, regulations, standards,
resources. contracts, etc.
• Malware: any type of malicious software • Legal liability: lawsuits, claims,
that can infect your devices or systems disputes, etc.
and perform harmful actions, such as
stealing data, deleting files, spying, etc.

You might also like