Preview

information security management

Better Essays
Open Document
Open Document
980 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
information security management
CHAPTER 12 WEEK 8: Information Security Management
Threat= person/ organization that seek to obtain or alter data/ assets illegally, without the owner’s permission (often without owner’s knowledge).
Vulnerability =opportunity for threats to gain access to individual or organizational assets
Safeguard = measure individuals or organizations take to block the threat from obtaining the asset
Target = asset desired by the threat

3 Sources of threats:

Human Error: accidental problems caused by both employees and nonemployees. (Accidental removal of customer records, installs old database, poorly written application programs, poorly designed procedures, physical accidents)

Computer Crime: employees and former employees intentionally destroy data or other system components. Hackers who break into a system & virus and worm writers who infect computer systems. Includes also terrorists and those who break into a system to steal for financial gain.

Natural Events and disasters: fire, floods, hurricanes … other acts of nature. Includes initial loss but also actions to recover from the initial problem.

5 Types of security loss:

Unauthorized data disclosure: When a threat obtains data that is supposed to be protected with Human error: Procedural mistakes
With Computer crime: - Pretexting = someone deceives by pretending to be someone else.
Phishing: Pretexting via e-mail
Spoofing: email spoofing (= phishing)/ IP spoofing = intruder uses another site’s IP address to masquerade as that other site
Sniffing : intercepting computer communications. Drive-by sniffers take computers with wireless connections through an area and search for unprotected wireless networks. Able to monitor and intercept wireless traffic at will. (Spyware, adware included).
Hacking: breaking into computers/servers/ networks to get personal data.
With natural events and disasters: less precautious about inadvertently disclose data.
Incorrect data modification :
With

You May Also Find These Documents Helpful

  • Satisfactory Essays

    * Creating phishing emails messages, also referred as spear phishing, that will be sent to the company or even specific staff employees.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Jit2 Task A Risk Register

    • 1596 Words
    • 5 Pages

    Natural Risks (Natural Disasters, Epidemics, Accidents) | Natural disasters (tornado, flood, hurricane, etc.), fires and accidents | Disaster Relief Team | Uncontrollable circumstances, weather,…

    • 1596 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Answer: Computer Hacking it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A threat is a general term used to describe a category of items that present a risk in jeopardizing the safety of an asset. A threat agent is a more specific term used to describe an exact piece of a threat. For example, all kitchen appliances pose a threat to those who use them, while a gas stove is a specific threat agent in this case.…

    • 982 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Identity theft is when someone steals another person’s identity through the internet. The identity stolen can be personal information such as account names and security numbers to use it for their own benefit. For example, a Facebook user can steal another Facebook user’s personal details by either hacking or visiting their profile, uploading their profile picture, gaining personal details and using it to create a fake account of that Facebook…

    • 769 Words
    • 4 Pages
    Good Essays
  • Best Essays

    English 142

    • 3186 Words
    • 13 Pages

    n.a., (2012) International Encyclopedia of the Social Sciences: “Natural Disasters”: Encyclopedia.com. April 2012.Web. 10 Aug. 2012.…

    • 3186 Words
    • 13 Pages
    Best Essays
  • Satisfactory Essays

    Sdpi Case Study

    • 162 Words
    • 1 Page

    Sensitive personal data or information- which includes passwords, sexual orientation, financial, medical and biometric information.…

    • 162 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Have you ever noticed how many deaths have occurred due to natural disasters? Well if you don’t know what a natural disaster is, it is a natural hazard to the environment (floods, tornados, hurricanes, volcanoes, earthquakes, tsunamis). All of these natural disasters can cause severe damage to the environment and many deaths. In this essay I am only going to talk about earthquakes and hurricanes.…

    • 405 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Better Essays

    Natural hazards such as floods, wildfires, winter storms, tornadoes, landslides, earthquakes, hurricanes, and other natural events, as well as accidental and deliberate man-made hazard will continue to impact our earth for thousands of years to come. These hazards have killed millions of people in the United States, and millions more have suffered the loss of home, health, family members, friends, and even have endured economic hardship.…

    • 1114 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Deceptive Phishing Attacks

    • 1051 Words
    • 5 Pages

    There are six common phishing attacks that we all have to know. The first common ways people “phish” is called “Deceptive Phishing.” This is when the person pretends to be a company and lead them to a fake site so they can put their information in. Next, is “Spear Phishing”, this is when the person tries to connect with the victim. By connecting, they email them with leading information about the person they are sending the email to. As if they know them personally. This is a really good way of tricking people into giving out their information. Many…

    • 1051 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    After reviewing the slideshow presentation in week fours learning activity I learned that cybercrime is the theft and destruction of information, resources, or funds by way of computers. (Siegel, Introduction to Criminal Justice, 2011) There are three types of cybercrimes; cyber theft, cyber vandalism, and cyber welfare. Cybercrime is increasing in the United States.…

    • 741 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Another common threat that companies face in terms of information security is cyber espionage. This practice is when secrets are obtained without the…

    • 1179 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Safeguarding of assets is those policies and procedures that "provide reasonable assurance regarding prevention or timely detection of unauthorized acquisition, use or disposition of the company 's assets that could have a material effect on the financial statements." This definition is consistent with the definition provided in the Committee of Sponsoring Organizations (COSO), Reporting to External Parties, which provides the following definition of internal control over safeguarding of assets:…

    • 1086 Words
    • 5 Pages
    Good Essays