0% found this document useful (0 votes)
26 views2 pages

AIS 1 - Chapter 7

Uploaded by

Honey Dizon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views2 pages

AIS 1 - Chapter 7

Uploaded by

Honey Dizon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

AIS 1 Chapter 7 Infection Methods

IT Governance, Ethical, and Security Issues in Information Virus


Technology ● has the ability to clone itself multiple times and attach
itself to a program of a computer through files
1 INFORMATION TECHNOLOGY GOVERNANCE - THE ● The first virus detected by ARPANET was the Creeper
MANAGEMENT AND CONTROL OF INFORMATION Virus
TECHNOLOGY Worms
● it infects computers that are within a network
Data Governance (DG) ● A worm does not cause harm unlike a virus, but it can
● basic level that implements IG consume space in a computer hard disk, thereby
● refers to the involvement of various processes and affecting speed
controls in order to ensure that data and information Trojan
gathered are unique, true, and accurate and can meet the ● from the Trojan Horse of Greek mythology
prescribed standards and business rules in a system ● hides itself inconspicuously inside a seemingly
● data cleansing or data scrubbing - strips out legitimate software
inaccurate, corrupted, and duplicated data in order to ● Examples are proxy Trojans, remote access Trojans,
eliminate the amount of redundancy and FTP Trojans
● steal information
Elements of DG Bots
★ People ● Bots are advanced versions of worms that do not
★ Process require human interaction to work
★ Technology ● Botnet is a network of infected systems formed by the
connection of different systems affected by a malicious
Information Technology Governance (ITG) bot
● assures stakeholders that a business investments in IT
create high business value and contribute toward Malware Actions
meeting laudable business objectives Adware
● chief information officer ● Not malicious but breaches privacy
● It is normally associated with free software
Control Objectives for Information and Related Technology Spyware
(CobIT) ● a spy by monitoring computer activities and gathering
● It is developed under the Information Systems Audit information
and Control Association (ISACA) ● A common spyware is the keylogger - records
● CobiT deals with many issues and concerns related to timestamped keystrokes of a user and takes important
technical issues, compliance, control requirements, and personal information
risks in business Ransomware
● has the ability to encrypt files and lock a computer,
Control rendering them inaccessible for extorting money
● Reducing IT risks and gaining more business value Rootkits
from IT ● devised to give a hacker administrative control in the
● Assisting in the completion of regulatory compliance system
requirements Scareware
● Employing a structured approach to improve the ● disguises itself as a tool that will help fix a computer
reporting and decision-making of the management of an system
organization Zombies
● Presenting a valuable solution to control assessment ● it stays put until commanded by the hacker
and project implementation in order to enhance IT asset
control Theft of Intellectual Property
● violation against intellectual property rights
Three Basic Organizational Levels of CobiT Identity Theft
● Top management - involves decision-makers, including ● action of impersonating someone in order to acquire
the board of directors and executive management his/her information
● IT management and business management Information Extortion
● Security level of governance, control, and workers ● stealing of business information for a certain amount of
money
PCMR (plan, create, run, and monitor) Theft of Equipment and Information
★ Plan and categorize ● steal information and gadgets
★ Acquire and apply Sabotage
★ Deliver and support ● destroying website leading to customer dissatisfaction
★ Monitor and evaluate
3 SECURITY THREATS TO INTERNET SERVICES

Information Technology Infrastructure Library (ITIL) Types of Computer Security Threats and Common Internet Threats
● to regulate the delivery of its IT services management ● Computer virus - sending spam messages, deactivating
● widely acceptable for both public and private sectors security settings, stealing data, deleting files and
● Compared with other ITG frameworks, ITIL offers applications
fundamental guidance to business organizations on the ● Rogue security software - used to deceive users that the
use of IT tools that facilitate change and transform system is infected with a virus
business ● Trojan horse
● Adware - Pop-ups can affect Internet and computer
Information Governance (IG) processor speeds
● The IG approach focuses on how an organization ● Spyware
controls its information generated by IT and other ● Computer worm - contact lists
office-related systems ● DoS and DDoS attacks
● To control information assets, reduce risks, ensure the ★ denial-of-service (DoS) - caused by a
compliance with rules and regulations, implement computer system connected to the Internet
information security, and improve information quality ★ distributed denial-of-service (DDoS) -
and accessibility launched from several computers, and the
number of computers involved can range
Electronic Mail (E-mail) from just a couple of them to thousands or
● E-mail is considered as the number one communication even more
channel in small, medium and large enterprises ● Phishing - involves collecting sensitive user
● Email archiving is a method of e-mail management and information, usually passwords and credit card numbers
information governance practice ● Rootkit
● SQL injection attack - harmful issues against data
2 SECURITY THREATS TO INFORMATION TECHNOLOGY confidentiality
AND INFORMATION SYSTEM ● Man-in-the-middle attack - to tap and listen to
conversations between two people
Malware/ Malicious Software ● Spam - Junk Mail/Spam folder
● is a program or code that is designed to infiltrate a ● Keyloggers
system and execute malicious operations and controls ● Pharming - a more complicated version of phishing
misuses the domain name system (DNS), fake login
page
Solutions to Overcome Security Threats
● Install an antivirus software
● Ensure that the anti-virus software is up-to-date
● Employ a firewall to protect networks - A firewall
enables a user to communicate outward while blocking
unauthorized entry or access of external systems
● Filter all email traffic
● Back-up critical data regularly
● Educate users about suspicious emails
● Scan downloads from the Internet
● Implement an information security policy
● Implement and monitor user and systems logs
● Create and report an incident response plan
● Restrict end-user access to systems

4 ETHICAL ISSUES IN INFORMATION TECHNOLOGY


● Privacy - right to determine what information they like
others to know
Internet privacy - refers to the privacy and security of
personal data published online
● Hacking - A hacker is a person who breaks
programming codes and passwords
● Virus - malicious software that damages a computer
system upon its installation
● Data access rights - is the permission granting the
location and reading of digital information to a user or
computer program
● Plagiarism - taking or copying the work of others found
online
Plagiarism in IT is the act of mimicking
● Ergonomy refers to the improvement of IT tools to
make them more efficient for users

technology innovation regarding health care in relation to IT


● Health informatics
● Mobile health and BYOD
● Wireless networking
● Telemedicine
● Patient engagement
● Clinical data analysis
● Storage infrastructure
● cloud-based electronic health record system

You might also like