CHAPTER 5. Important Security in Organisation
CHAPTER 5. Important Security in Organisation
IMPORTANCE OF
INFORMATION SECURITY
IN ORGANIZATIONS
Muhamad Khairulnizam Zaini
Senior Lecturer
Information Systems Management
UiTM Selangor
2017
1
LESSON OBJECTIVES:
1
Understand the importance of information security to organizations
2
THE IMPORTANCE
OF INFORMATION
SECURITY
3
The Importance of Information Security for Business
4
Discussions..
Protect
Prevents
profit and
data theft
regulation
Information
Protect
& computer
intellectual
crimes has
property
escalated
5
THE VULNERABILITY
& THREATS
6
Source: https://heimdalsecurity.com 7
OVERVIEW: VULNERABILITIES & THREATS
A vulnerability refers to a
known weakness of an asset
(resource) that can be
exploited by one or more
attackers. In other words, it is
a known issue that allows an
attack to be successful. For
example, when a team
member resigns and you
forget to disable their access
to external accounts, change
logins or remove their names
A threat refers to a new or newly discovered incident with the from company credit cards,
potential to do harm to a system or your overall organization. this leaves your business
There are three main types of threats – natural threats (e.g., open to both intentional and
floods or a tornado), unintentional threats (such as an unintentional threats.
employee mistakenly accessing the wrong information) and
intentional threats.
Sources of threats
10
Deliberate Forces of Deviations in Technical Technical Technological
software nature quality of Hardware software obsolescence
attack • Unauthorized services failure failure • Uselessness
• viruses access • Power, Lan , • equipment • Bugs, codes technology
• Denial or • Data collection Wan loopholes etc • Outdated tech
service • Service issues
from service
providers
Sources of threats
11
12
Malicious Threats: Insiders
The most common threat
We cannot know for sure whether Lewandowski used the files to help Uber
in their own project, but the situation was ostentatious enough that Waymo
sued Uber and asked for a halt in their self-driving car trials until further
notice.
If the allegations are true, the damage caused to Waymo, and Google for
that matter, could far exceed the one caused by an external hacking. Years
of hard work and investment were practically handed over on silver platter
14
to a major competitor.
source: https://heimdalsecurity.com/
15
http://www.cdse.edu/documents/toolkits- http://www.cdse.edu/documents/cdse/CDSE-Insider-Threat-
insider/Robert-Mo-Insider-Threat-Case-Study.pdf Case-Study-Yuan-Li.pdf
Security Vulnerability
A vulnerability is a weakness which allows an attacker to reduce a
system's information assurance.
Vulnerability is the intersection of three elements: a system
susceptibility or flaw, attacker access to the flaw, and attacker
capability to exploit the flaw ("The Three Tenets of Cyber
Security". U.S. Air Force Software Protection Initiative.
Retrieved 2009-12-15).
A vulnerability refers to a known weakness of an asset (resource)
that can be exploited by one or more attackers. In other words, it
is a known issue that allows an attack to be successful.
16
Vulnerability assessment
Benefits of a Vulnerability Assessment & Cyber
Security Assessment The goal is to limit exposure
and attack surfaces to make compromising and
exploitation of network vulnerabilities more difficult.
Source: http://www.infosightinc.com/solutions/advisory-services/vulnerability-assessment.php
Impact of Security Risks and Threats
20