BIS 321 Chapter One Part Two
BIS 321 Chapter One Part Two
Information Security
(BIS 321)
Introduction
Information is the key asset in most organizations.
information.
The threat comes from others who would like to acquire the information or
achieve.
Malicious Non-Malicious
Floods
Fires
Earthquakes
Hurricanes
Outsiders like …
Insiders like
Crackers Ignorant
Disgruntled
and Employees
Employees
Hackers
5
Contd.
1. Natural Disaster:- Nobody can stop nature from taking its course.
Earthquakes, hurricanes, floods, lightning, and fire can cause
severe damage to computer systems.
Information can be lost, downtime or loss of productivity can
occur, and damage to hardware can disrupt other essential services.
Few safeguards can be implemented against natural disasters.
The best approach is to have disaster recovery plans and
contingency plans in place.
Other threats such as riots, wars, and terrorist attacks could be
included here.
6
Although they are human-caused threats, they are classified as
Contd.
2. Human Threats:- Malicious threats consist of inside attacks by
disgruntled or malicious employees and outside attacks by non-
employees just looking to harm and disrupt an organization.
Insiders are the most dangerous attackers, because they know
many of the codes and security measures that are already in place .
Insiders can plant viruses, Trojan horses, or worms, and they can
browse through the file system.
By browsing through a system, an insider can learn confidential
information.
Trojan horses are a threat to both the integrity and confidentiality
of information in the system.
Insiders can affect availability by overloading the system's
7
processing or storage capacity, or by causing the system to crash.
Contd.
Disgruntled employees can create both mischief and sabotage on a
computer system.
Common examples of computer-related employee sabotage include:
i. Changing/Deleting Data
ii. Destroying data or programs with logic bombs
iii. Crashing systems
iv. Holding data hostage
v. Destroying hardware or facilities
vi. Entering data incorrectly.
12
DoS attacks are designed to prevent legitimate use of a service.
Contd.
Attackers achieve this by flooding a network with more traffic than it
protocol packets.
Routers and servers eventually become overloaded by attempting to
13
route or handle each packet.
Contd.
Computers use certain core resources, such as network bandwidth,
memory, CPU time, and hard drive space, to operate and function
correctly.
The operating system and applications than run on the system play
an important role in managing these resources correctly.
When the operating system or the resources are overrun by
malicious attacks, one or more of these core resources breaks
down, causing the system to crash or stop responding.
An attacker can cause resources to be overrun by various means,
including consuming server resources, saturating network
14
resources, and mail bombing.
Contd.
6. E-mail hacking:- With access to Internet e-mail, someone can
forged.
16
redirect the message
Eavesdropping on a Dialog
Dialog
Hello
Client PC
Server
Bob
Alice
Hello
Balance =
Balance = $1
Client PC $1,000,000 Server
Bob Alice
Balance =$1
Balance =
$1,000,000
Attacker (Eve) intercepts
21
and alters messages
Contd.
3. Non-Malicious Threats:- The primary threat to data integrity comes
from authorized users who are not aware of the actions they are
performing.
Errors and omissions can cause valuable data to be lost, damaged,
or altered.
Non-malicious threats usually come from employees who are
untrained in computers and are unaware of security threats and
vulnerabilities.
Note that ignorant employees usually have no motives and goals
for causing damage. The damage is accidental.
Malicious attackers can deceive ignorant employees by using
"social engineering" to gain entry.
The attacker could masquerade as an administrator and ask for
22 passwords and user names
Contd.