Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Excel crash course exam answers

09/01/2021 Client: saad24vbs Deadline: 2 Day

1 | Office | Faculty | Department


Week 8


Information Security


ISYS 111


Fundamentals of Business Information Systems


2 | Office | Faculty | Department


Why are we doing this?


By completing the activities in this week, you should be able to:


1. Give one specific example of each of the five factors that are contributing to the


increasing vulnerability of information resources.


2. Compare and contrast human mistakes and social engineering by way of


specific examples.


3. Describe negative consequences that might result from at least three different


kinds of deliberate attacks on information systems.


4. Assess how you might employ each of the three risk mitigation strategies in the


context of your owning a home.


5. Identify the three major types of controls that organisations can use to protect


their information resources


6. Have the database skills to establish table relationships and set field properties


3 | Office | Faculty | Department


Essential Question


What are the major threats to information security and how to minimise


them?


20 Interesting cyber crime statistics:


https://securityintelligence.com/20-eye-opening-cybercrime-statistics/


Information Security and IT


• IT, properly used can have enormous benefits for individuals,


organisations, and entire societies.


• Examples?


https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

4 | Office | Faculty | Department


• Unfortunately, IT can also be misused, often with devastating


consequences.


• Examples?


Introduction to information security


• Security


• The degree of protection against criminal activity, danger, damage, and/or loss


• Information security


• Protecting an organisation’s information resources from un-authorised access, use, disclosure, disruption, modification, or destruction


• Threat (to an information resource)


• Any danger to which a system may be exposed


5 | Office | Faculty | Department


Introduction to information security


• Exposure (of an information resource)


• The harm, loss or damage that can result if a threat compromises that resource


• Vulnerability (of an information resource)


• The possibility that the system will be harmed by a threat


Factors that increase the vulnerability


of information resources


What are the factors that may increase the vulnerability of information


resources?


6 | Office | Faculty | Department


Five factors that increase the vulnerability


of information resources


1. Networked business environment


2. Smaller, faster, cheaper computers and storage devices


3. Decreasing skills necessary to be a hacker • New and easier tools make it very easy to attack the network


• Attacks are becoming increasingly sophisticated


4. Organised crime taking over cybercrime • Hacktivist groups: Anonymous and LulzSec


5. Lack of management support


https://en.wikipedia.org/wiki/Anonymous_(group)

https://en.wikipedia.org/wiki/LulzSec

7 | Office | Faculty | Department


Unintentional threats to information


systems


Social engineering • Attacker uses social skills to trick a legitimate employee into providing confidential


company information such as passwords


• Typically unintentional human error on the part of an employee, but it is the result of


a deliberate action on the part of an attacker


• Techniques: Tailgating, shoulder surfing


8 | Office | Faculty | Department


• Interview with Kevin Mitnick


https://www.sbs.com.au/ondemand/video/441169475950/kevin-mitnick-the-worlds-most-famous-hacker-the-feed

9 | Office | Faculty | Department


Human Errors


10 | Office | Faculty | Department


Security threats


Watch Lateline interview with Kevin


Mitnick’s: http://www.abc.net.a


u/lateline/content/20 16/s4561331.htm


(16:57 minutes)


http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

11 | Office | Faculty | Department


Deliberate threats to IS


• Espionage (practice of spying) or trespass


• Information extortion


• Sabotage or vandalism


• Theft of equipment or information


• Identity theft


• Compromises to intellectual property


• Software attacks


• Alien software (or pestware)


• Supervisory control and data acquisition (SCADA) attacks


• Cyberterrorism and cyberwarfare


12 | Office | Faculty | Department


Cyber security facts


13 | Office | Faculty | Department


14 | Office | Faculty | Department


What organisations are doing to protect information resources?


Risk management


• Risk


• The probability that a threat will impact an information resource


• Risk management


• Identify, control, and minimise the impact of threats


15 | Office | Faculty | Department


• Risk analysis


• Prioritize assets (probability x value) • Compare cost of security breach vs. cost of control


• Risk mitigation


• Organisation takes concrete actions again risk • Implement controls and develop recovery plan • 3 strategies: • Risk acceptance: (Accept the potential risk, continue operating with no controls, and absorb any


damages that occur)


• Risk limitation: Limit the risk by implementing controls that minimise the impact of threat • Risk transference: Transfer the risk by using other means to compensate for the loss, such as


purchasing insurance


16 | Office | Faculty | Department


Information security controls


Figur e 7.3


PHYSICAL CONTROLS: prevent unauthorised access


ACCESS CONTROL: restrict unauthorised access


COMMUNICATION CONTROLS : protect data


movements across network


Denial - of - service protection


Intrusion detection system


Anti - malware software


Whitelisting and blacklisting


ID system


Encryption


d Access passwor


Authentication: proof of identity


- ID


- Access Password


- Voice


Authorisation: permission to


do certain activities


- Administrator


- Regular user


- Guest


| Office | Faculty | Department


Chapter Summary


This chapter focused on


• The factors contributing to increasing vulnerability of


information


• Human mistakes and social engineering


• Deliberate attacks on information systems


• Risk mitigation and risk mitigation strategies


• Security controls used to protect


information resources


18 | Office | Faculty | Department


18

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Top Essay Tutor
Helping Hand
Best Coursework Help
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$65 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$60 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$60 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Richmond food co op - Data models and decisions exercise answers - Fundamentals of Speech Communication 3 - What did the detective say to the crook - RQ 2 - Hp system management homepage 7.5 5 download - Leadership Style - Zim integrated shipping services ltd address - Budget & Stress for Police Officers - Tigerair philippines web check in - Advantages and disadvantages of flat plate collector - Guyland chapter 4 summary - Estate planning 2.7 2 a2 answers - Bnp paribas prime brokerage inc - Chapter 7 problem 7a journalizing and posting transactions answers - Hoover stainless steel totes - Shrek low angle shot - Ribble valley riding club - French baroque floral design - Greek theatre worksheet answers - HELP! - Quadratic equation by extracting square roots definition - Method statement exhibition stand - Why is ambush marketing so harmful to a sports organization - Children's auditory performance scale - Observations of chemical changes lab - Personal psu edu j5j ipip ipipneo120 htm - Prepare income statements for each year using absorption costing - Bruker tensor 27 ftir spectrometer - Questions1 - Where is the book of the dead kept - SOCW6510 - How do impurities affect boiling point - Pspi payroll service providers inc - Unsw report cover page - Bangor university marking grades - Example of autobiography of students - Earned sales commissions receiving cash - Pim testing in das systems - Battle of Little Bighorn - Buffalo wild wings code of ethics - As 1940 audit checklist - New milton infant school - Flora accounting services completed these transactions in february - Old testament character sketch bible study - Powerpoint - Quiz - Water filtration experiment hypothesis - Quadratic relations grade 10 - Captsone Information Technology management - Bre 45 degree rule - Guy sebastian standing with you piano sheet music - Operation mangement - Easa part 145 regulations - NEED IN 15 HOURS or LESS - Acca p4 june 2011 - Amy tan mother tongue textual analysis - Meg and mog age range - What is data abstraction in python - A firm's demand curve is given by p 500 2q - Critical response essay - Emg pickup color code - Rhetorical Analysis - Mount ridley college review - Track software inc integrative case 2 - Into thin air andy harris - Assumptions of systems theory social work - Corey corey and callanan decision making model - What is a sewing person called - Nba street homecourt backwards compatible - HW - Political Science Week 4 Assignment - What are the three subatomic particles found in an atom - Bus stirling to callander - General motors brazil service parts business - Indian camp ernest hemingway character analysis - Healthcare industry average financial ratios 2017 - 4.3 3 connect network devices - Insulation resistance class i equipment with mineral insulated heating elements - Desiree's baby reading thinking guide answers - Why can't aldehydes hydrogen bond - Cybertext building blocks of accounting a financial perspective - Sta rite lil shark - Argumentative research essay - Papa johns swot analysis 2017 - Free christian biography ebooks - Question- 8hours - 06.04 the korean war - Exodus in a nutshell - The wages of sin literary analysis - Wiley e text registration code - Characteristics of a detective story - Solar system model rubric - Project scope of software development example - Uncovering the market segment Nissan targeted with the Cube - Manrose thru wall fan kit - Abercrombie and fitch employment discrimination - Geopolitical community and phenomenological community - Examples of primary dimensions of diversity - Stroke