Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

20 eye opening cybercrime statistics

04/12/2021 Client: muhammad11 Deadline: 2 Day

1 | Office | Faculty | Department

Week 8

Information Security

ISYS 111

Fundamentals of Business Information Systems

2 | Office | Faculty | Department

Why are we doing this?

By completing the activities in this week, you should be able to:

1. Give one specific example of each of the five factors that are contributing to the

increasing vulnerability of information resources.

2. Compare and contrast human mistakes and social engineering by way of

specific examples.

3. Describe negative consequences that might result from at least three different

kinds of deliberate attacks on information systems.

4. Assess how you might employ each of the three risk mitigation strategies in the

context of your owning a home.

5. Identify the three major types of controls that organisations can use to protect

their information resources

6. Have the database skills to establish table relationships and set field properties

3 | Office | Faculty | Department

Essential Question

What are the major threats to information security and how to minimise

them?

20 Interesting cyber crime statistics:

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

Information Security and IT

• IT, properly used can have enormous benefits for individuals,

organisations, and entire societies.

• Examples?

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
4 | Office | Faculty | Department

• Unfortunately, IT can also be misused, often with devastating

consequences.

• Examples?

Introduction to information security

• Security

• The degree of protection against criminal activity, danger, damage, and/or loss

• Information security

• Protecting an organisation’s information resources from un-authorised access, use, disclosure, disruption, modification, or destruction

• Threat (to an information resource)

• Any danger to which a system may be exposed

5 | Office | Faculty | Department

Introduction to information security

• Exposure (of an information resource)

• The harm, loss or damage that can result if a threat compromises that resource

• Vulnerability (of an information resource)

• The possibility that the system will be harmed by a threat

Factors that increase the vulnerability

of information resources

What are the factors that may increase the vulnerability of information

resources?

6 | Office | Faculty | Department

Five factors that increase the vulnerability

of information resources

1. Networked business environment

2. Smaller, faster, cheaper computers and storage devices

3. Decreasing skills necessary to be a hacker • New and easier tools make it very easy to attack the network

• Attacks are becoming increasingly sophisticated

4. Organised crime taking over cybercrime • Hacktivist groups: Anonymous and LulzSec

5. Lack of management support

https://en.wikipedia.org/wiki/Anonymous_(group)
https://en.wikipedia.org/wiki/LulzSec
7 | Office | Faculty | Department

Unintentional threats to information

systems

Social engineering • Attacker uses social skills to trick a legitimate employee into providing confidential

company information such as passwords

• Typically unintentional human error on the part of an employee, but it is the result of

a deliberate action on the part of an attacker

• Techniques: Tailgating, shoulder surfing

8 | Office | Faculty | Department

• Interview with Kevin Mitnick

https://www.sbs.com.au/ondemand/video/441169475950/kevin-mitnick-the-worlds-most-famous-hacker-the-feed
9 | Office | Faculty | Department

Human Errors

10 | Office | Faculty | Department

Security threats

Watch Lateline interview with Kevin

Mitnick’s: http://www.abc.net.a

u/lateline/content/20 16/s4561331.htm

(16:57 minutes)

http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
11 | Office | Faculty | Department

Deliberate threats to IS

• Espionage (practice of spying) or trespass

• Information extortion

• Sabotage or vandalism

• Theft of equipment or information

• Identity theft

• Compromises to intellectual property

• Software attacks

• Alien software (or pestware)

• Supervisory control and data acquisition (SCADA) attacks

• Cyberterrorism and cyberwarfare

12 | Office | Faculty | Department

Cyber security facts

13 | Office | Faculty | Department

14 | Office | Faculty | Department

What organisations are doing to protect information resources?

Risk management

• Risk

• The probability that a threat will impact an information resource

• Risk management

• Identify, control, and minimise the impact of threats

15 | Office | Faculty | Department

• Risk analysis

• Prioritize assets (probability x value) • Compare cost of security breach vs. cost of control

• Risk mitigation

• Organisation takes concrete actions again risk • Implement controls and develop recovery plan • 3 strategies: • Risk acceptance: (Accept the potential risk, continue operating with no controls, and absorb any

damages that occur)

• Risk limitation: Limit the risk by implementing controls that minimise the impact of threat • Risk transference: Transfer the risk by using other means to compensate for the loss, such as

purchasing insurance

16 | Office | Faculty | Department

Information security controls

Figur e 7.3

PHYSICAL CONTROLS: prevent unauthorised access

ACCESS CONTROL: restrict unauthorised access

COMMUNICATION CONTROLS : protect data

movements across network

Denial - of - service protection

Intrusion detection system

Anti - malware software

Whitelisting and blacklisting

ID system

Encryption

d Access passwor

Authentication: proof of identity

- ID

- Access Password

- Voice

Authorisation: permission to

do certain activities

- Administrator

- Regular user

- Guest

| Office | Faculty | Department

Chapter Summary

This chapter focused on

• The factors contributing to increasing vulnerability of

information

• Human mistakes and social engineering

• Deliberate attacks on information systems

• Risk mitigation and risk mitigation strategies

• Security controls used to protect

information resources

18 | Office | Faculty | Department

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

A Grade Exams
Engineering Solutions
Assignment Hub
Math Specialist
Solutions Store
ECFX Market
Writer Writer Name Offer Chat
A Grade Exams

ONLINE

A Grade Exams

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$36 Chat With Writer
Engineering Solutions

ONLINE

Engineering Solutions

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$29 Chat With Writer
Assignment Hub

ONLINE

Assignment Hub

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$38 Chat With Writer
Math Specialist

ONLINE

Math Specialist

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$46 Chat With Writer
Solutions Store

ONLINE

Solutions Store

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$50 Chat With Writer
ECFX Market

ONLINE

ECFX Market

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$50 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Exploding the moment - Unit VIII PowerPoint - Champion spark plug guide australia - Signature Assignment: Financial Contingency Planning: Sources of Funding Paper - Empty nest syndrome scholarly articles - Dr van boggus sylvania oh - Book Review Of The Glass Castle - Criminal law - Queensland christian soccer association - Ibm server warranty renewal - Coding the wbs for the information system - Full of sound and fury signifying nothing faulkner - Advantages and disadvantages of training methods ppt - Jealous husband returns in form of parrot - Kinner and company flandreau sd - Range of tolerance worksheet - Butlins spring harvest 2014 - Rutherford scattering simulation answers - Indentity vs role confusion - Reasearch paper assignment - Agilent 7890a parts list - Lvl hyspan span table - Nhsp online application form - Explain how built in stabilizers work - Module 6 Discussion - CYBER SECURITY PRINCIPLES - How have economic forecasts for this country evolved - Research Paper - Biome map coloring worksheet ask a biologist - The strategy that beanstalk would most likely want to follow is called a ________ strategy. - Obsessive compulsive disorder nursing diagnosis - I need 3300 words on Research competitive company websites and social media to see what type of postings are done - Guiding principles of supervision - American civil war a streetcar named desire - Short Essay - Berrima district credit union internet banking - Back to back stem and leaf plot examples - Standard chartered bank reward points - Bostik hg3 glue gun - Need report based on 9&10 chapters - Trigonal planar polar or nonpolar - Marie antoinette letter to her mother 1773 - Fear in the dressmaker - You overhear a staff member verbally abusing a young client - Future Vision of Informatics - Unit 3 Discussion - Mickey gilley and johnny lee dakota magic casino october 4 - Walmart retail link supply chain case study answers - Blc reflective essay - She wet like the ocean pull out the trojan - Risk acceptance mitigation transference avoidance - Everyday use literary analysis - Chipotle mexican grill business strategy - Image skincare consent form - What happens on a river bend - The beatles eleanor rigby lyrics meaning - Process Recording Social Work - Astor mickey mouse radio - Economic lens - Nightingale apartments san diego - Igcse history 40 mark question - Social q app kmart - Adela (encantar) la música de tito "el bambino". a me (interesar) la música de otros países. - What does the word root hyster refer to - Discussion question - Oscar brand charlotte the harlot - Discussion/criminal justice - Safe harbor provisions under hipaa - Asx spi 200 index futures - Neurovascular observations post surgery - ITCC200 - Othello act 1 questions and answers - How my brother leon - Rssb taking safe decisions - Cloud computing - Digging by seamus heaney literary devices - And your name is jonah - Religion and Ethics - Analysis draft paper - Cambridge lawn tennis club membership - Paper - 84 mullis rd odum ga 31555 - Engstrom auto mirror plant motivating in good times and bad - Cryptography - Lady macduff scene macbeth - EXAM FAST TOURISM !!!!!! 40 MINUTES !!!!! - Braums bacon mushroom swiss burger calories - Module 09 Case Study - Points to consider when choosing a seam - Genetic theory holds that criminality producing traits are - Change the zoom level for the worksheet to be 110 - Cgs1000 - City of sydney da checklist - District council of peterborough - Civilize them with a stick summary - The stockholders equity of tvx company at the beginning - Dulux kitchen paint problems - Unit 7 Assignment Philosophy - Kopophobia is the fear of - Yellow 5 and red 40