AIS 1 - Chapter 7
AIS 1 - Chapter 7
Information Technology Infrastructure Library (ITIL) Types of Computer Security Threats and Common Internet Threats
● to regulate the delivery of its IT services management ● Computer virus - sending spam messages, deactivating
● widely acceptable for both public and private sectors security settings, stealing data, deleting files and
● Compared with other ITG frameworks, ITIL offers applications
fundamental guidance to business organizations on the ● Rogue security software - used to deceive users that the
use of IT tools that facilitate change and transform system is infected with a virus
business ● Trojan horse
● Adware - Pop-ups can affect Internet and computer
Information Governance (IG) processor speeds
● The IG approach focuses on how an organization ● Spyware
controls its information generated by IT and other ● Computer worm - contact lists
office-related systems ● DoS and DDoS attacks
● To control information assets, reduce risks, ensure the ★ denial-of-service (DoS) - caused by a
compliance with rules and regulations, implement computer system connected to the Internet
information security, and improve information quality ★ distributed denial-of-service (DDoS) -
and accessibility launched from several computers, and the
number of computers involved can range
Electronic Mail (E-mail) from just a couple of them to thousands or
● E-mail is considered as the number one communication even more
channel in small, medium and large enterprises ● Phishing - involves collecting sensitive user
● Email archiving is a method of e-mail management and information, usually passwords and credit card numbers
information governance practice ● Rootkit
● SQL injection attack - harmful issues against data
2 SECURITY THREATS TO INFORMATION TECHNOLOGY confidentiality
AND INFORMATION SYSTEM ● Man-in-the-middle attack - to tap and listen to
conversations between two people
Malware/ Malicious Software ● Spam - Junk Mail/Spam folder
● is a program or code that is designed to infiltrate a ● Keyloggers
system and execute malicious operations and controls ● Pharming - a more complicated version of phishing
misuses the domain name system (DNS), fake login
page
Solutions to Overcome Security Threats
● Install an antivirus software
● Ensure that the anti-virus software is up-to-date
● Employ a firewall to protect networks - A firewall
enables a user to communicate outward while blocking
unauthorized entry or access of external systems
● Filter all email traffic
● Back-up critical data regularly
● Educate users about suspicious emails
● Scan downloads from the Internet
● Implement an information security policy
● Implement and monitor user and systems logs
● Create and report an incident response plan
● Restrict end-user access to systems