You are on page 1of 22

SECURING

INFORMATION
SYSTEM
CHAPTER 8

SECURING
INFORMATION
SYSTEM
CHAPTER 8

SECURING
INFORMATION
SYSTEM
February 2000, 15-year-old Michael Calce, also known
as "Mafiaboy," discovered how to take over networks of
university computers. He used their combined resources
to disrupt the number-one search engine at the time:
Yahoo. Within one week, he'd also brought down Dell,
eBay, CNN and Amazon using a
distributed-denial-of-service (DDoS) attack that
overwhelmed corporate servers and caused their
websites to crash. Calce's wake-up call was perhaps the
most jarring for cyber crime investors and internet
proponents.
Vulnerability of information
system.

ERRORS
ABUSE
DESTRUCTION
Refers to the policies, procedures, and
technical measures used to prevent
unauthorized access, alteration, theft, or
SECURITY physical damage to information
systems.

Internal control is a process, effected by an


entity's board of directors, management and
INTERNAL other personnel, designed to provide
CONTROL reasonable assurance: That information is
reliable, accurate and timely. Of compliance
with applicable laws, regulations, contracts,
policies and procedures.
Communication lines

• Tapping
• Sniffing
• Message alteration
• Theft
USER/ • Fraud SERVER
CLIENT • Hacking
• Unauthorized • Malware
access • Vandalism
• Errors • Denial of Service
Attacks
INTERNET ACCESS PORTABILITY

The popularity of handheld mobile devices


for business computing adds to these woes.
Portability makes cell phones, smartphones,
and tablet computers easy to lose or steal.
Smartphones share the same security
weaknesses as other Internet devices and are
vulnerable to malicious software and
penetration from outsiders.
Internet Vulnerabilities

Vulnerability has also increased from widespread use of the following:


a. e-mail
b. instant messaging (IM),
c. file-sharing programs.

E-mail may contain attachments that serve as springboards for malicious software or unauthorized
access to internal corporate systems. Employees may use e-mail messages to transmit valuable trade
secrets, financial data, or confidential customer information to unauthorized recipients. Popular IM
applications for consumers do not use a secure layer for text messages, so they can be intercepted and
read by outsiders during transmission over the Internet.
Internet Vulnerabilities

Wireless Security Challenges

The practice is called "juice jacking,"


where criminals load malware onto
charging stations or cables they leave
plugged in at the stations. The goal is to
infect phones and other devices of
unsuspecting users and then hack their
data.
Malicious software
programs are
referred to as
malware and include
a variety of threats
such as computer
viruses, worms, and
Trojan horses.
1 2 3
A computer worm is a standalone
malware computer program that
replicates itself in order to spread to
other computers. It often uses a computer
network to spread itself, relying on
security failures on the target computer
to access it. It will use this machine as a
host to scan and infect other computers.

1 2 3
However, I can provide some general information
about computer viruses. A computer virus is a type
of malicious software that is designed to replicate
itself and spread from one computer to another. It
can cause a range of issues, including data
corruption, data loss, and system crashes.
Computer viruses can spread through various
means, such as email attachments, infected websites,
and shared files.

1 2 3
A Trojan virus, also known as a Trojan horse, is a
type of malware that disguises itself as legitimate
software, but once installed on a computer, it
performs malicious actions without the user's
knowledge or consent. Unlike viruses, Trojan horses
do not replicate themselves or spread to other
computers on their own. They rely on the user to
execute the program or file that contains the Trojan.
Because of this, it's important to be cautious when
downloading or opening files from unknown or
untrusted sources, and to keep your antivirus software
up to date to detect and remove Trojan viruses.
1 2 3
Phishing Ransomware Spyware Keyloggers

Phishing is a type of social engineering attack


often used to steal user data, including login
credentials and credit card numbers. It
occurs when an attacker, masquerading as a
trusted entity, dupes a victim into opening an
email, instant message, or text message.
Phishing Ransomware Spyware Keyloggers

Ransomware is a form of malware designed to encrypt


files on a device, rendering any files and the systems that
rely on them unusable. Malicious actors then demand
ransom in exchange for decryption.
Phishing Ransomware Spyware Keyloggers

Spyware is any software that installs itself on your


computer and starts covertly monitoring your
online behavior without your knowledge or
permission. Spyware is a kind of malware that
secretly gathers information about a person or
organization and relays this data to other parties.
Phishing Ransomware Spyware Keyloggers

Keyloggers, or keystroke loggers, are tools that


record what a person types on a device. While there
are legitimate and legal uses for keyloggers, many
uses for keyloggers are malicious. In a keylogger
attack, the keylogger software records every
keystroke on the victim's device and sends it to the
attacker.
hacker
hacker
hacker
A hacker is an individual who intends
to gain unauthorized access to a
computer system. Hackers gain
unauthorized access by finding
weaknesses in the security protections
websites and computer systems
employ, often taking advantage of
various features of the Internet that
make it an open system and easy to
use.
E,MPLOYEE

Employees have access to privileged information, and in the


presence of sloppy internal security procedures, they are often
able to roam throughout an organization’s systems without
leaving a trace.
Preventive Measures Regular software updates and patches:

Strong passwords and two-factor


authentication:

Employee training and awareness:

Network security measures:

Backup and recovery plans

You might also like