Chapter 8
Chapter 8
Jovita Angela
Learning Objectives
01 02 03
Why are information
What is the business What are the components of
systems vulnerable to
value of security and an organizational framework
destruction, error, and
control? for security and control?
abuse?
04
What are the most important
tools and technologies for
safeguarding information
resources?
SYSTEM VULNERABILITY AND ABUSE (1)
You need to make security and WHY SYSTEMS ARE VULNERABLE?
control a top priority to operate
When data are stored in electronic form, The potential for
a business . unauthorized access, abuse, or fraud is not limited to a
single location but can occur at any access point in the
Security network.
The policies, procedures, and
.
technical measures used to
prevent unauthorized access,
alteration, theft, or physical
damage to information
systems.
Controls
Methods, policies, and
organizational procedures
that ensure the safety of the
organization’s assets; the
accuracy and reliability of its
records; and operational
adherence to management
standards.
SYSTEM VULNERABILITY AND ABUSE (2)
Internet Vulnerabilities Wireless security challenges
01 02 01 02
Network open to Attachments with Radio frequency bands Users often fail to
anyone. malicious software. easy to scan SSIDs (service implement WEP or stronger
set identifiers). systems.
03 04
Use of fixed Interception. 03 04
Internet addresses Uses shared
Identify access
with cable or DSL password for both
05 points.
modems creates users and access
Transmitting trade
fixed targets point.
secrets System 05
hackers.
Vulnerability and
Abuse. Broadcast multiple 06
06 times. War driving.
Size of Internet 07
means abuses Unencrypted
can have wide VOIP.
impact.
MALICIOUS SOFTWARE: VIRUSES, WORMS, TROJAN
HORSES, AND SPYWARE
Malicious software: malware and a variety of threats.
Worms
Independent computer programs
A computer virus that copy themselves from one
A rogue software program that computer to other computers
Trojan horse
attaches itself to other software over a network. A software program that
programs or data files in order to appears to be benign but then
be executed, usually without user does something other than
knowledge or permission. expected. It is often a way for
viruses to be introduced into a
Spyware computer system.
Small programs install
themselves surreptitiously on
computers to monitor user Web
surfing activity and serve up
advertising.
HACKERS AND COMPUTER CRIME
A hacker: An individual who intends to Computer crime: Any violations of criminal law that
gain unauthorized access to a computer involve a knowledge of computer technology for
system. their perpetration, investigation, or prosecution.
Fault-Tolerant Computer
Controlling Network Traffic Security Outsourcing
Systems Bandwith-consuming Company can outsource
Redundant hardware, software, applications such as file- many security functions e
and power supply components sharing programs, Internet to provide a secure high-
that create an environment that phone service, and online video availability computing
provides continuous, are able to clog and slow down environment.
uninterrupted service. corporate networks, degrading
Try to minimize
performance. Managed Security
downtime
service providers
Downtime (MSSPs)
Periods of time in which Deep Packet Inspection monitor network
a system is not (DPI) activity and perform
operational. Examines data files and vulnerability testing
sorts out low-priority online and intrusion
material while assigning detection.
higher priority to business-
critical files.
SECURITY ISSUES FOR CLOUD COMPUTING AND THE MOBILE
DIGITAL PLATFORM
Although cloud computing and the emerging mobile digital platform
have the potential to deliver powerful benefits, they pose new
challenges to system security and reliability.