Mis 6 Information Security2
Mis 6 Information Security2
Mis 6 Information Security2
Information Security
• What is Information Security?
• Why is it Important?
• What Can We Do?
What Is Information Security?
• Protection of information systems against
unauthorized access to or modification of
information, whether in storage, processing or
transit, and against the denial of service to
authorized users or the provision of service to
unauthorized users, including those measures
necessary to detect, document, and counter such
threats.
• Deals with several different "trust" aspects of
information and its protection
What Is Information Security?
Points to “bad” IP
Address!
Keystroke logging
• Often called key logging is a diagnostic used in
software development that captures the user's
keystrokes
• Useful to determine sources of error in computer
programs
• Used to measure employee productivity on certain
clerical tasks
• Highly useful for law enforcement and espionage
• Obtain passwords or encryption keys and thus
bypassing other security measures
Keystroke Logging
• Can be achieved by both hardware and software
means
• Hardware key loggers are commercially
available devices which come in three types:
– Inline devices that are attached to the keyboard cable
– Devices installed inside standard keyboards
– Keyboards that contain the key logger already
built-in
Why is it Important?
• Over the last two years, the IT security threat landscape
has changed significantly.
• Traditional malware threats hit an apparent wall in 2005
• However new threats (bots, spam, phishing) have
stepped into the void.
• Remember the objective - the “CIA Triad” :
– Confidentiality
– Integrity
– Availability (Recoverability)
Why is it Important?
• Security Awareness
– Not just for the geeks!
– Security Training at all levels (external and/or
internal)
– Continuing education and awareness – not a
one-time shot!
– Make it part of the culture
IT’S A JUNGLE OUT THERE
A computer program
• File deletion
• File corruption
• Visual effects
• Pop-Ups
• Erratic (and unwanted) behavior
• Computer crashes
WHAT CAN WE DO?
Set bookmarks to authoritative:
•anti-virus Web pages • virus hoax Web pages
•public free anti-virus removal tools
Provide patrons with: up-to-date information about viruses,
etc.
Confirm:
that desktops have the latest anti-virus updates
BACK IT UP