Module02 Information Sercurity
Module02 Information Sercurity
https://limeproxies.netlify.app/blog/top-10-information-security-threats-in-2018/
Threats (1/2): Unintentional threats
http://www.tekspecz.com/new-blog-2/2015/6/20/what-part-of-malware-you-dont-understand
Discussion
• Group 1: Spyware
• Group 2: Rootkit
• Group 3: Trojan
• Group 4: Worm
• Group 5: Adware
→ Concept and example
Threats (2/2): Deliberate threats
• Who?
o Amateurs (“fun”), “hacktavists”, individual
criminals, organized crime, foreign governments, …
Threats (2/2): Deliberate threats
Remote Attacks Requiring User Action
Threats (2/2): Deliberate threats
Remote Attacks Needing No User Action
Threats (2/2): Deliberate threats
Attacks by a Programmer Developing a System
Factors contributing to the increasing
vulnerability of organisational information
• https://thehackernews.com/2018/04/iot-hacking-thermometer.html
Agenda
Integrity
Confidentiality
A set of rules that limits access to information.
• Constant monitoring
Security is a management issue
Management must take responsibility:
• Alternative hardware
o Hot sites, etc.
Privacy, security and ethics