Top Banner
Threats To Information Security By Swapneel
21
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Threats to information security

Threats To Information

Security

By Swapneel

Page 2: Threats to information security

WHAT IS INFORMATION ?

• Information is a complete set of data.

• It can be called as processed data.

Page 3: Threats to information security

WHAT IS INFORMATION SECURITY ?

• It is protection of information systems and hardware that use, store and transit the information.

• Security is the quality or state of information

• Security is always multilayered : Physical Security

Personal Security

Operations Security

Communications Security

Network Security

Page 4: Threats to information security

THREATS TO INFORMATION SECURITY

• A threat is an object, person, or other entity that represents a constant danger to an asset.

• The Management should ensure that information is given sufficient protection through policies, proper training and proper equipment.

• Consistent reviews andBetter information security can be provided by recognizing and ranking the threats to the information.

• Checks also help and Surveys also help in keeping information safe

Page 5: Threats to information security

TYPES OF THREATS TO INFORMATION

• Inadvertent Acts

• Deliberate Acts

• Natural Disaster (Natural Forces)

• Technical Failures

• Management Failure

Page 6: Threats to information security

INADVERTENT ACTS

• These are the acts that happen by mistake. They are not deliberate

• The attacker does not have any ill will or malicious intent or his attack is not proven in categories of theft.

• Acts of Human error and failure, Deviation from service quality, communication error, are examples of inadvertent acts

Page 7: Threats to information security

DELIBERATE ACTS

• These acts are done by people of organizations to harm the information.

• The attackers have a malicious intent and wish to steal or destroy the data.

• Acts of espionage, Hacking, Cracking, come under deliberate acts.

Page 8: Threats to information security

NATURAL DISASTERS

• Forces of nature are dangerous because they are unexpected and come without very little warning.

• They disrupt lives of individuals but also causes damage to information that is stored within computers.

• These threats can be avoided but he management must have the necessary precautions.

Page 9: Threats to information security

TECHNICAL FAILURES

• Technical failures are classified into two types :

• Technical Hardware Failure

• Technical Software Failure

• Technical Hardware Failure: It occurs when manufacturer distributes equipment with flaws that may be known or unknown to the manufacturer

• Technical Software Failure: These can cause the system to perform in an undesirable or unexpected way. Some of these are unrecoverable while some occur periodically

Page 10: Threats to information security

MANAGEMENT FAILURE

•Management must always be updated about recent developments and technology.

•Proper planning must be done by the management for good protection of the information.

• IT professionals must help the management in protecting the information, by helping the management upgrade to the latest technology.

Page 11: Threats to information security

MALWARE

• It is any malicious software designed to harm a computer without the user’s consent.

• Eg. VIRUS, Worm, Trojan, Spyware

Page 12: Threats to information security

VIRUS (VITAL INFORMATION RESOURCE UNDER SIEGE )

• It is a computer program designed to copy itself and attach itself to other files stored on a computer.

• It moves from computer to computer through by attaching itself to files or boot records of disks.

• It can be sent through a network or a removable storage device.

Page 13: Threats to information security

WORM

• Worm is a self replicating computer program that uses a network to send copies of itself to other computers on the network.

• It replicates ad eats up the computer storage.

• An example is Voyager Worm

Page 14: Threats to information security

TROJAN HORSE• They appear to be harmless but secretly

gather information about the user.

• They upload hidden and malicious programs on the computer without the user’s knowledge.

• It does not attempt to inject itself into other files unlike computer virus.

Page 15: Threats to information security

SPYWARE• It secretly monitors internet surfing habits

without user’s knowledge.

• They perform actions like advertising vague products and changing computer configurations. These actions are very troublesome.

• They usually do not replicate themselves.

Page 16: Threats to information security

PROTECTION AGAINST MALWARE

• Make sure that you have updated operating system and antivirus software. Eg. McAfee

• Do not use pirated software, or download files from unreliable sources.

• Perform regular hard drive scans.

• Use licensed software

Page 17: Threats to information security

HACKING

• Hacking means finding out weaknesses in a computer or a network and exploiting them.

• Hackers are usually motivated by profit, protest or challenge.

Page 18: Threats to information security

HACKER

• He/She is a person who enjoys the challenge of breaking into computers without the knowledge of the user.

• Their main aim might be to know the detail of a programmable system and how it works.

• Hackers are experts who see new ways to use computers.

Page 19: Threats to information security

CRACKER

• These people crack or remove the protection mechanism of a computer system.

• Their main aim is to steal or destroy information without the users consent

• They are much more dangerous than hackers.

Page 20: Threats to information security

ANTIVIRUS

• It is a software used to prevent, detect and remove malware.

• It runs in the background at all times.

• It should be kept updated.

• It runs computer disk scans periodically.

• Eg. McAfee, Norton, Kaspersky.

Page 21: Threats to information security

THANK YOU !!!!HOPE YOU LIKED THE PRESENTATION.

YOU MAY START CHATTING NOW.