Download - Threats to information security
![Page 1: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/1.jpg)
Threats To Information
Security
By Swapneel
![Page 2: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/2.jpg)
WHAT IS INFORMATION ?
• Information is a complete set of data.
• It can be called as processed data.
![Page 3: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/3.jpg)
WHAT IS INFORMATION SECURITY ?
• It is protection of information systems and hardware that use, store and transit the information.
• Security is the quality or state of information
• Security is always multilayered : Physical Security
Personal Security
Operations Security
Communications Security
Network Security
![Page 4: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/4.jpg)
THREATS TO INFORMATION SECURITY
• A threat is an object, person, or other entity that represents a constant danger to an asset.
• The Management should ensure that information is given sufficient protection through policies, proper training and proper equipment.
• Consistent reviews andBetter information security can be provided by recognizing and ranking the threats to the information.
• Checks also help and Surveys also help in keeping information safe
![Page 5: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/5.jpg)
TYPES OF THREATS TO INFORMATION
• Inadvertent Acts
• Deliberate Acts
• Natural Disaster (Natural Forces)
• Technical Failures
• Management Failure
![Page 6: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/6.jpg)
INADVERTENT ACTS
• These are the acts that happen by mistake. They are not deliberate
• The attacker does not have any ill will or malicious intent or his attack is not proven in categories of theft.
• Acts of Human error and failure, Deviation from service quality, communication error, are examples of inadvertent acts
![Page 7: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/7.jpg)
DELIBERATE ACTS
• These acts are done by people of organizations to harm the information.
• The attackers have a malicious intent and wish to steal or destroy the data.
• Acts of espionage, Hacking, Cracking, come under deliberate acts.
![Page 8: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/8.jpg)
NATURAL DISASTERS
• Forces of nature are dangerous because they are unexpected and come without very little warning.
• They disrupt lives of individuals but also causes damage to information that is stored within computers.
• These threats can be avoided but he management must have the necessary precautions.
![Page 9: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/9.jpg)
TECHNICAL FAILURES
• Technical failures are classified into two types :
• Technical Hardware Failure
• Technical Software Failure
• Technical Hardware Failure: It occurs when manufacturer distributes equipment with flaws that may be known or unknown to the manufacturer
• Technical Software Failure: These can cause the system to perform in an undesirable or unexpected way. Some of these are unrecoverable while some occur periodically
![Page 10: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/10.jpg)
MANAGEMENT FAILURE
•Management must always be updated about recent developments and technology.
•Proper planning must be done by the management for good protection of the information.
• IT professionals must help the management in protecting the information, by helping the management upgrade to the latest technology.
![Page 11: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/11.jpg)
MALWARE
• It is any malicious software designed to harm a computer without the user’s consent.
• Eg. VIRUS, Worm, Trojan, Spyware
![Page 12: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/12.jpg)
VIRUS (VITAL INFORMATION RESOURCE UNDER SIEGE )
• It is a computer program designed to copy itself and attach itself to other files stored on a computer.
• It moves from computer to computer through by attaching itself to files or boot records of disks.
• It can be sent through a network or a removable storage device.
![Page 13: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/13.jpg)
WORM
• Worm is a self replicating computer program that uses a network to send copies of itself to other computers on the network.
• It replicates ad eats up the computer storage.
• An example is Voyager Worm
![Page 14: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/14.jpg)
TROJAN HORSE• They appear to be harmless but secretly
gather information about the user.
• They upload hidden and malicious programs on the computer without the user’s knowledge.
• It does not attempt to inject itself into other files unlike computer virus.
![Page 15: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/15.jpg)
SPYWARE• It secretly monitors internet surfing habits
without user’s knowledge.
• They perform actions like advertising vague products and changing computer configurations. These actions are very troublesome.
• They usually do not replicate themselves.
![Page 16: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/16.jpg)
PROTECTION AGAINST MALWARE
• Make sure that you have updated operating system and antivirus software. Eg. McAfee
• Do not use pirated software, or download files from unreliable sources.
• Perform regular hard drive scans.
• Use licensed software
![Page 17: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/17.jpg)
HACKING
• Hacking means finding out weaknesses in a computer or a network and exploiting them.
• Hackers are usually motivated by profit, protest or challenge.
![Page 18: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/18.jpg)
HACKER
• He/She is a person who enjoys the challenge of breaking into computers without the knowledge of the user.
• Their main aim might be to know the detail of a programmable system and how it works.
• Hackers are experts who see new ways to use computers.
![Page 19: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/19.jpg)
CRACKER
• These people crack or remove the protection mechanism of a computer system.
• Their main aim is to steal or destroy information without the users consent
• They are much more dangerous than hackers.
![Page 20: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/20.jpg)
ANTIVIRUS
• It is a software used to prevent, detect and remove malware.
• It runs in the background at all times.
• It should be kept updated.
• It runs computer disk scans periodically.
• Eg. McAfee, Norton, Kaspersky.
![Page 21: Threats to information security](https://reader036.vdocuments.us/reader036/viewer/2022062319/5560e7fdd8b42a3d768b4ff9/html5/thumbnails/21.jpg)
THANK YOU !!!!HOPE YOU LIKED THE PRESENTATION.
YOU MAY START CHATTING NOW.