SlideShare a Scribd company logo
Principles of Information Security,
Fifth Edition
Chapter 2
The Need for Security
Lesson 2 – Threats
Learning Objectives
• Upon completion of this material, you should be
able to:
– Explain why a successful information security program is
the shared responsibility of an organization’s general
management and IT management
– List and describe the threats posed to information
security
Principles of Information Security, Fifth Edition 2
Threats
• Threat: a potential risk to an asset’s loss of value
• Management must be informed about the various
threats to an organization’s people, applications,
data, and information systems.
• Overall security is improving, so is the number of
potential hackers.
• The 2010–2011 CSI/FBI survey found
– 67.1 percent of organizations had malware
infections.
– 11 percent indicated system penetration by an
outsider.
Principles of Information Security, Fifth Edition 3
Principles of Information Security, Fifth Edition 4
Principles of Information Security, Fifth Edition 5
Principles of Information Security, Fifth Edition 6
Compromises to Intellectual Property
• Intellectual property (IP): creation, ownership, and
control of original ideas as well as the
representation of those ideas
• The most common IP breaches involve software
piracy.
• Two watchdog organizations investigate software
abuse:
– Software & Information Industry Association (SIIA)
– Business Software Alliance (BSA)
• Enforcement of copyright law has been attempted
with technical security mechanisms.
Principles of Information Security, Fifth Edition 7
Deviations in Quality of Service
• Information system depends on the successful
operation of many interdependent support systems.
• Internet service, communications, and power
irregularities dramatically affect the availability of
information and systems.
Principles of Information Security, Fifth Edition 8
Deviations in Quality of Service
(cont’d)
• Internet service issues
– Internet service provider (ISP) failures can considerably
undermine the availability of information.
– Outsourced Web hosting provider assumes
responsibility for all Internet services as well as for the
hardware and Web site operating system software.
• Communications and other service provider issues
– Other utility services affect organizations: telephone,
water, wastewater, trash pickup.
– Loss of these services can affect organization’s ability
to function.
Principles of Information Security, Fifth Edition 9
Principles of Information Security, Fifth Edition 10
Deviations in Quality of Service
(cont’d)
• Power irregularities
– Commonplace
– Lead to fluctuations such as power excesses, power
shortages, and power losses
– Sensitive electronic equipment vulnerable to and
easily damaged/destroyed by fluctuations
– Controls can be applied to manage power quality.
Principles of Information Security, Fifth Edition 11
Espionage or Trespass
• Access of protected information by unauthorized
individuals
• Competitive intelligence (legal) versus industrial
espionage (illegal)
• Shoulder surfing can occur anywhere a person
accesses confidential information.
• Controls let trespassers know they are encroaching
on organization’s cyberspace.
• Hackers use skill, guile, or fraud to bypass controls
protecting others’ information.
Principles of Information Security, Fifth Edition 12
Principles of Information Security, Fifth Edition 13
Espionage or Trespass (cont’d)
• Expert hacker
– Develops software scripts and program exploits
– Usually a master of many skills
– Will often create attack software and share with
others
• Unskilled hacker
– Many more unskilled hackers than expert hackers
– Use expertly written software to exploit a system
– Do not usually fully understand the systems they
hack
Principles of Information Security, Fifth Edition 14
Principles of Information Security, Fifth Edition 15
Espionage or Trespass (cont’d)
• Other terms for system rule breakers:
– Cracker: “cracks” or removes software protection
designed to prevent unauthorized duplication
– Phreaker: hacks the public telephone system to
make free calls or disrupt services
• Password attacks
– Cracking
– Brute force
– Dictionary
– Rainbow tables
– Social engineering
Principles of Information Security, Fifth Edition 16
Principles of Information Security, Fifth Edition 17
Forces of Nature
• Forces of nature can present some of the most
dangerous threats.
• They disrupt not only individual lives, but also
storage, transmission, and use of information.
• Organizations must implement controls to limit
damage and prepare contingency plans for
continued operations.
Principles of Information Security, Fifth Edition 18
Human Error or Failure
• Includes acts performed without malicious intent or
in ignorance
• Causes include:
– Inexperience
– Improper training
– Incorrect assumptions
• Employees are among the greatest threats to an
organization’s data.
Principles of Information Security, Fifth Edition 19
Principles of Information Security, Fifth Edition 20
Human Error or Failure (cont’d)
• Employee mistakes can easily lead to:
– Revelation of classified data
– Entry of erroneous data
– Accidental data deletion or modification
– Data storage in unprotected areas
– Failure to protect information
• Many of these threats can be prevented with
training, ongoing awareness activities, and
controls.
• Social engineering uses social skills to convince
people to reveal access credentials or other
valuable information to an attacker.
Principles of Information Security, Fifth Edition 21
Social Engineering
• “People are the weakest link. You can have the best
technology; firewalls, intrusion-detection systems,
biometric devices ... and somebody can call an
unsuspecting employee. That's all she wrote, baby.
They got everything.”—Kevin Mitnick
• Advance-fee fraud: indicates recipient is due money
and small advance fee/personal banking information
required to facilitate transfer
• Phishing: attempt to gain personal/confidential
information; apparent legitimate communication hides
embedded code that redirects user to third-party site
Principles of Information Security, Fifth Edition 22
Principles of Information Security, Fifth Edition 23
Information Extortion
• Attacker steals information from a computer system
and demands compensation for its return or
nondisclosure. Also known as cyberextortion.
• Commonly done in credit card number theft
Principles of Information Security, Fifth Edition 24
Sabotage or Vandalism
• Threats can range from petty vandalism to
organized sabotage.
• Web site defacing can erode consumer confidence,
diminishing organization’s sales, net worth, and
reputation.
• Threat of hacktivist or cyberactivist operations is
rising.
• Cyberterrorism/Cyberwarfare: a much more sinister
form of hacking
Principles of Information Security, Fifth Edition 25
Principles of Information Security, Fifth Edition 26

More Related Content

PPT
Information Assurance And Security - Chapter 1 - Lesson 2
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 2 - Lesson 1
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 1 - Lesson 4
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 1 - Lesson 1
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 1 - Lesson 3
MLG College of Learning, Inc
 
PDF
WD - Unit - 2 - HTML & CSS
Gyanmanjari Institute Of Technology
 
PDF
Error,Failure and Risk
Nazrul Islam
 
PPTX
SCIENCE, TECHNOLOGY, AND SOCIETY lesson 1.pptx
erwin marlon sario
 
Information Assurance And Security - Chapter 1 - Lesson 2
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 2 - Lesson 1
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 1 - Lesson 4
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 1 - Lesson 1
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 1 - Lesson 3
MLG College of Learning, Inc
 
WD - Unit - 2 - HTML & CSS
Gyanmanjari Institute Of Technology
 
Error,Failure and Risk
Nazrul Islam
 
SCIENCE, TECHNOLOGY, AND SOCIETY lesson 1.pptx
erwin marlon sario
 

What's hot (20)

PPT
Information Assurance And Security - Chapter 2 - Lesson 3
MLG College of Learning, Inc
 
PDF
Information Security Lecture Notes
FellowBuddy.com
 
PPT
Ethics in IT Security
mtvvvv
 
PPT
Information Assurance And Security - Chapter 3 - Lesson 3
MLG College of Learning, Inc
 
PPTX
Information security
avinashbalakrishnan2
 
DOCX
The CIA Triad - Assurance on Information Security
Bharath Rao
 
PPT
Security and information assurance
bdemchak
 
PPT
information security management
Gurpreetkaur838
 
PPT
Information Assurance And Security - Chapter 3 - Lesson 2
MLG College of Learning, Inc
 
PPTX
02 Legal, Ethical, and Professional Issues in Information Security
sappingtonkr
 
PPT
Basics of Information System Security
chauhankapil
 
PPT
Cyber security vs information assurance
Vaughan Olufemi ACIB, AICEN, ANIM
 
PPT
Information security
razendar79
 
PPT
Information Assurance And Security - Chapter 3 - Lesson 1
MLG College of Learning, Inc
 
PPTX
Information Security Lecture #1 ppt
vasanthimuniasamy
 
PPT
Chapter2 the need to security
Dhani Ahmad
 
PPTX
Network security
toamma
 
PPTX
The CIA triad.pptx
GulnurAzat
 
PPT
Legal, Ethical and professional issues in Information Security
Gamentortc
 
PPTX
Ethics in-information-security
Milinda Wickramasinghe
 
Information Assurance And Security - Chapter 2 - Lesson 3
MLG College of Learning, Inc
 
Information Security Lecture Notes
FellowBuddy.com
 
Ethics in IT Security
mtvvvv
 
Information Assurance And Security - Chapter 3 - Lesson 3
MLG College of Learning, Inc
 
Information security
avinashbalakrishnan2
 
The CIA Triad - Assurance on Information Security
Bharath Rao
 
Security and information assurance
bdemchak
 
information security management
Gurpreetkaur838
 
Information Assurance And Security - Chapter 3 - Lesson 2
MLG College of Learning, Inc
 
02 Legal, Ethical, and Professional Issues in Information Security
sappingtonkr
 
Basics of Information System Security
chauhankapil
 
Cyber security vs information assurance
Vaughan Olufemi ACIB, AICEN, ANIM
 
Information security
razendar79
 
Information Assurance And Security - Chapter 3 - Lesson 1
MLG College of Learning, Inc
 
Information Security Lecture #1 ppt
vasanthimuniasamy
 
Chapter2 the need to security
Dhani Ahmad
 
Network security
toamma
 
The CIA triad.pptx
GulnurAzat
 
Legal, Ethical and professional issues in Information Security
Gamentortc
 
Ethics in-information-security
Milinda Wickramasinghe
 
Ad

Similar to Information Assurance And Security - Chapter 2 - Lesson 2 (20)

PPTX
Chapter 2 - Lesson 2.pptx
JhaiJhai6
 
PPT
ch02_2.ppt
IbrahimAl22
 
PPT
ch02_2.ppt
gtrajasekaran1
 
PPT
Principles of information security ch02_2.ppt
EstherBaguma
 
PPTX
chapter1 Introduction to Software Security.pptx
Lina Shimelis
 
PPTX
Lecture-2 about programming download.pptx
MUHAMMADAHMAD173574
 
PPTX
Cloud Security.pptx
Binod Rimal
 
PPT
DATA SECURITY AND CONTROL.ppt
WilsonWanjohi5
 
PPTX
Lecture 6 Cybersecurity-Basics and .pptx
akatsesena2003
 
PPTX
Network security
mena kaheel
 
PDF
Lecture 01 Information Security BS computer Science
maqib8373
 
PPTX
2014-09-03 Cybersecurity and Computer Crimes
Raffa Learning Community
 
PPTX
2014-09-03 Cybersecurity and Computer Crimes
Raffa Learning Community
 
PPT
MIS part 4_CH 11.ppt
EndAlk15
 
PPTX
Management Information Systems ( Security and Control.pptx
NamugenyiBetty
 
PPT
Information Technology Security Basics
Mohan Jadhav
 
PPTX
Cyber Security Briefing
Marshall Frett Jr.
 
PPT
Security information for internet and security
Somesh Kumar
 
PPT
IT-Security-20210426203847.ppt
ssuser6c59cb
 
PPT
IT-Security-20210426203847.ppt
RamaNingaiah
 
Chapter 2 - Lesson 2.pptx
JhaiJhai6
 
ch02_2.ppt
IbrahimAl22
 
ch02_2.ppt
gtrajasekaran1
 
Principles of information security ch02_2.ppt
EstherBaguma
 
chapter1 Introduction to Software Security.pptx
Lina Shimelis
 
Lecture-2 about programming download.pptx
MUHAMMADAHMAD173574
 
Cloud Security.pptx
Binod Rimal
 
DATA SECURITY AND CONTROL.ppt
WilsonWanjohi5
 
Lecture 6 Cybersecurity-Basics and .pptx
akatsesena2003
 
Network security
mena kaheel
 
Lecture 01 Information Security BS computer Science
maqib8373
 
2014-09-03 Cybersecurity and Computer Crimes
Raffa Learning Community
 
2014-09-03 Cybersecurity and Computer Crimes
Raffa Learning Community
 
MIS part 4_CH 11.ppt
EndAlk15
 
Management Information Systems ( Security and Control.pptx
NamugenyiBetty
 
Information Technology Security Basics
Mohan Jadhav
 
Cyber Security Briefing
Marshall Frett Jr.
 
Security information for internet and security
Somesh Kumar
 
IT-Security-20210426203847.ppt
ssuser6c59cb
 
IT-Security-20210426203847.ppt
RamaNingaiah
 
Ad

More from MLG College of Learning, Inc (20)

PPTX
PC111.Lesson1
MLG College of Learning, Inc
 
PPTX
PC111-lesson1.pptx
MLG College of Learning, Inc
 
PPTX
PC LEESOON 6.pptx
MLG College of Learning, Inc
 
PPTX
PC 106 PPT-09.pptx
MLG College of Learning, Inc
 
PPTX
PC 106 PPT-07
MLG College of Learning, Inc
 
PPTX
PC 106 PPT-01
MLG College of Learning, Inc
 
PPTX
PC 106 Slide 04
MLG College of Learning, Inc
 
PPTX
PC 106 Slide no.02
MLG College of Learning, Inc
 
PPTX
pc-106-slide-3
MLG College of Learning, Inc
 
PPTX
PC 106 Slide 2
MLG College of Learning, Inc
 
PPTX
PC 106 Slide 1.pptx
MLG College of Learning, Inc
 
PDF
Db2 characteristics of db ms
MLG College of Learning, Inc
 
PDF
Db1 introduction
MLG College of Learning, Inc
 

Recently uploaded (20)

PPTX
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PPTX
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
PPTX
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PPTX
CDH. pptx
AneetaSharma15
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
CDH. pptx
AneetaSharma15
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
Basics and rules of probability with real-life uses
ravatkaran694
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 

Information Assurance And Security - Chapter 2 - Lesson 2

  • 1. Principles of Information Security, Fifth Edition Chapter 2 The Need for Security Lesson 2 – Threats
  • 2. Learning Objectives • Upon completion of this material, you should be able to: – Explain why a successful information security program is the shared responsibility of an organization’s general management and IT management – List and describe the threats posed to information security Principles of Information Security, Fifth Edition 2
  • 3. Threats • Threat: a potential risk to an asset’s loss of value • Management must be informed about the various threats to an organization’s people, applications, data, and information systems. • Overall security is improving, so is the number of potential hackers. • The 2010–2011 CSI/FBI survey found – 67.1 percent of organizations had malware infections. – 11 percent indicated system penetration by an outsider. Principles of Information Security, Fifth Edition 3
  • 4. Principles of Information Security, Fifth Edition 4
  • 5. Principles of Information Security, Fifth Edition 5
  • 6. Principles of Information Security, Fifth Edition 6
  • 7. Compromises to Intellectual Property • Intellectual property (IP): creation, ownership, and control of original ideas as well as the representation of those ideas • The most common IP breaches involve software piracy. • Two watchdog organizations investigate software abuse: – Software & Information Industry Association (SIIA) – Business Software Alliance (BSA) • Enforcement of copyright law has been attempted with technical security mechanisms. Principles of Information Security, Fifth Edition 7
  • 8. Deviations in Quality of Service • Information system depends on the successful operation of many interdependent support systems. • Internet service, communications, and power irregularities dramatically affect the availability of information and systems. Principles of Information Security, Fifth Edition 8
  • 9. Deviations in Quality of Service (cont’d) • Internet service issues – Internet service provider (ISP) failures can considerably undermine the availability of information. – Outsourced Web hosting provider assumes responsibility for all Internet services as well as for the hardware and Web site operating system software. • Communications and other service provider issues – Other utility services affect organizations: telephone, water, wastewater, trash pickup. – Loss of these services can affect organization’s ability to function. Principles of Information Security, Fifth Edition 9
  • 10. Principles of Information Security, Fifth Edition 10
  • 11. Deviations in Quality of Service (cont’d) • Power irregularities – Commonplace – Lead to fluctuations such as power excesses, power shortages, and power losses – Sensitive electronic equipment vulnerable to and easily damaged/destroyed by fluctuations – Controls can be applied to manage power quality. Principles of Information Security, Fifth Edition 11
  • 12. Espionage or Trespass • Access of protected information by unauthorized individuals • Competitive intelligence (legal) versus industrial espionage (illegal) • Shoulder surfing can occur anywhere a person accesses confidential information. • Controls let trespassers know they are encroaching on organization’s cyberspace. • Hackers use skill, guile, or fraud to bypass controls protecting others’ information. Principles of Information Security, Fifth Edition 12
  • 13. Principles of Information Security, Fifth Edition 13
  • 14. Espionage or Trespass (cont’d) • Expert hacker – Develops software scripts and program exploits – Usually a master of many skills – Will often create attack software and share with others • Unskilled hacker – Many more unskilled hackers than expert hackers – Use expertly written software to exploit a system – Do not usually fully understand the systems they hack Principles of Information Security, Fifth Edition 14
  • 15. Principles of Information Security, Fifth Edition 15
  • 16. Espionage or Trespass (cont’d) • Other terms for system rule breakers: – Cracker: “cracks” or removes software protection designed to prevent unauthorized duplication – Phreaker: hacks the public telephone system to make free calls or disrupt services • Password attacks – Cracking – Brute force – Dictionary – Rainbow tables – Social engineering Principles of Information Security, Fifth Edition 16
  • 17. Principles of Information Security, Fifth Edition 17
  • 18. Forces of Nature • Forces of nature can present some of the most dangerous threats. • They disrupt not only individual lives, but also storage, transmission, and use of information. • Organizations must implement controls to limit damage and prepare contingency plans for continued operations. Principles of Information Security, Fifth Edition 18
  • 19. Human Error or Failure • Includes acts performed without malicious intent or in ignorance • Causes include: – Inexperience – Improper training – Incorrect assumptions • Employees are among the greatest threats to an organization’s data. Principles of Information Security, Fifth Edition 19
  • 20. Principles of Information Security, Fifth Edition 20
  • 21. Human Error or Failure (cont’d) • Employee mistakes can easily lead to: – Revelation of classified data – Entry of erroneous data – Accidental data deletion or modification – Data storage in unprotected areas – Failure to protect information • Many of these threats can be prevented with training, ongoing awareness activities, and controls. • Social engineering uses social skills to convince people to reveal access credentials or other valuable information to an attacker. Principles of Information Security, Fifth Edition 21
  • 22. Social Engineering • “People are the weakest link. You can have the best technology; firewalls, intrusion-detection systems, biometric devices ... and somebody can call an unsuspecting employee. That's all she wrote, baby. They got everything.”—Kevin Mitnick • Advance-fee fraud: indicates recipient is due money and small advance fee/personal banking information required to facilitate transfer • Phishing: attempt to gain personal/confidential information; apparent legitimate communication hides embedded code that redirects user to third-party site Principles of Information Security, Fifth Edition 22
  • 23. Principles of Information Security, Fifth Edition 23
  • 24. Information Extortion • Attacker steals information from a computer system and demands compensation for its return or nondisclosure. Also known as cyberextortion. • Commonly done in credit card number theft Principles of Information Security, Fifth Edition 24
  • 25. Sabotage or Vandalism • Threats can range from petty vandalism to organized sabotage. • Web site defacing can erode consumer confidence, diminishing organization’s sales, net worth, and reputation. • Threat of hacktivist or cyberactivist operations is rising. • Cyberterrorism/Cyberwarfare: a much more sinister form of hacking Principles of Information Security, Fifth Edition 25
  • 26. Principles of Information Security, Fifth Edition 26