Lecture 02 - The Need For Security-3
Lecture 02 - The Need For Security-3
Source: https://www.oaic.gov.au
Why do we Need InfoSec? – OAIC 2022
Key Statistics – OAIC Jan – June 2022
396 breaches were notified compared to 460 in July to December
2021 (14% decrease).
Source: https://www.oaic.gov.au
Why do we Need InfoSec? – OAIC 2022
Breakdown – OAIC 2022
Key Statistics – OAIC Jan – June 2022
Source: https://www.oaic.gov.au
Malicious or Criminal Attack Breakdown
Source: https://www.oaic.gov.au
Cyber Incidents Breakdown - OAIC 2022
Source: https://www.oaic.gov.au
Human Error Breakdown - OAIC 2022
Source: https://www.oaic.gov.au
Threats to Information Security
Threats to Information Security
• Approximately 4.1
billion people have
some form of internet
access, just over 50% of
the world's population.
• increase of 24% since
2010.
Threat intelligence is information about threats and threat agents that help mitigate cyber
attack. Information is based on past, current and future trends.
Threat intelligence provides the context necessary to make informed decisions about the
protection of information systems
2. Operational:
details of the motivation or capabilities of threat actors, including
their tools, techniques and procedures
3. Strategic:
intelligence about the overarching risks associated with cyber
threats which can be used to drive high-level organisational
strategy
Threat Models
Casehelp
Threat Models Study (Target)
to prioritize security threats by identifying high-
risk vulnerabilities or threats and mitigate threats to protect sensitive
data.