Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

20 eye opening cybercrime statistics

04/12/2021 Client: muhammad11 Deadline: 2 Day

1 | Office | Faculty | Department

Week 8

Information Security

ISYS 111

Fundamentals of Business Information Systems

2 | Office | Faculty | Department

Why are we doing this?

By completing the activities in this week, you should be able to:

1. Give one specific example of each of the five factors that are contributing to the

increasing vulnerability of information resources.

2. Compare and contrast human mistakes and social engineering by way of

specific examples.

3. Describe negative consequences that might result from at least three different

kinds of deliberate attacks on information systems.

4. Assess how you might employ each of the three risk mitigation strategies in the

context of your owning a home.

5. Identify the three major types of controls that organisations can use to protect

their information resources

6. Have the database skills to establish table relationships and set field properties

3 | Office | Faculty | Department

Essential Question

What are the major threats to information security and how to minimise

them?

20 Interesting cyber crime statistics:

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

Information Security and IT

• IT, properly used can have enormous benefits for individuals,

organisations, and entire societies.

• Examples?

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
4 | Office | Faculty | Department

• Unfortunately, IT can also be misused, often with devastating

consequences.

• Examples?

Introduction to information security

• Security

• The degree of protection against criminal activity, danger, damage, and/or loss

• Information security

• Protecting an organisation’s information resources from un-authorised access, use, disclosure, disruption, modification, or destruction

• Threat (to an information resource)

• Any danger to which a system may be exposed

5 | Office | Faculty | Department

Introduction to information security

• Exposure (of an information resource)

• The harm, loss or damage that can result if a threat compromises that resource

• Vulnerability (of an information resource)

• The possibility that the system will be harmed by a threat

Factors that increase the vulnerability

of information resources

What are the factors that may increase the vulnerability of information

resources?

6 | Office | Faculty | Department

Five factors that increase the vulnerability

of information resources

1. Networked business environment

2. Smaller, faster, cheaper computers and storage devices

3. Decreasing skills necessary to be a hacker • New and easier tools make it very easy to attack the network

• Attacks are becoming increasingly sophisticated

4. Organised crime taking over cybercrime • Hacktivist groups: Anonymous and LulzSec

5. Lack of management support

https://en.wikipedia.org/wiki/Anonymous_(group)
https://en.wikipedia.org/wiki/LulzSec
7 | Office | Faculty | Department

Unintentional threats to information

systems

Social engineering • Attacker uses social skills to trick a legitimate employee into providing confidential

company information such as passwords

• Typically unintentional human error on the part of an employee, but it is the result of

a deliberate action on the part of an attacker

• Techniques: Tailgating, shoulder surfing

8 | Office | Faculty | Department

• Interview with Kevin Mitnick

https://www.sbs.com.au/ondemand/video/441169475950/kevin-mitnick-the-worlds-most-famous-hacker-the-feed
9 | Office | Faculty | Department

Human Errors

10 | Office | Faculty | Department

Security threats

Watch Lateline interview with Kevin

Mitnick’s: http://www.abc.net.a

u/lateline/content/20 16/s4561331.htm

(16:57 minutes)

http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
11 | Office | Faculty | Department

Deliberate threats to IS

• Espionage (practice of spying) or trespass

• Information extortion

• Sabotage or vandalism

• Theft of equipment or information

• Identity theft

• Compromises to intellectual property

• Software attacks

• Alien software (or pestware)

• Supervisory control and data acquisition (SCADA) attacks

• Cyberterrorism and cyberwarfare

12 | Office | Faculty | Department

Cyber security facts

13 | Office | Faculty | Department

14 | Office | Faculty | Department

What organisations are doing to protect information resources?

Risk management

• Risk

• The probability that a threat will impact an information resource

• Risk management

• Identify, control, and minimise the impact of threats

15 | Office | Faculty | Department

• Risk analysis

• Prioritize assets (probability x value) • Compare cost of security breach vs. cost of control

• Risk mitigation

• Organisation takes concrete actions again risk • Implement controls and develop recovery plan • 3 strategies: • Risk acceptance: (Accept the potential risk, continue operating with no controls, and absorb any

damages that occur)

• Risk limitation: Limit the risk by implementing controls that minimise the impact of threat • Risk transference: Transfer the risk by using other means to compensate for the loss, such as

purchasing insurance

16 | Office | Faculty | Department

Information security controls

Figur e 7.3

PHYSICAL CONTROLS: prevent unauthorised access

ACCESS CONTROL: restrict unauthorised access

COMMUNICATION CONTROLS : protect data

movements across network

Denial - of - service protection

Intrusion detection system

Anti - malware software

Whitelisting and blacklisting

ID system

Encryption

d Access passwor

Authentication: proof of identity

- ID

- Access Password

- Voice

Authorisation: permission to

do certain activities

- Administrator

- Regular user

- Guest

| Office | Faculty | Department

Chapter Summary

This chapter focused on

• The factors contributing to increasing vulnerability of

information

• Human mistakes and social engineering

• Deliberate attacks on information systems

• Risk mitigation and risk mitigation strategies

• Security controls used to protect

information resources

18 | Office | Faculty | Department

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

A Grade Exams
Engineering Solutions
Assignment Hub
Math Specialist
Solutions Store
ECFX Market
Writer Writer Name Offer Chat
A Grade Exams

ONLINE

A Grade Exams

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$36 Chat With Writer
Engineering Solutions

ONLINE

Engineering Solutions

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$29 Chat With Writer
Assignment Hub

ONLINE

Assignment Hub

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$38 Chat With Writer
Math Specialist

ONLINE

Math Specialist

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$46 Chat With Writer
Solutions Store

ONLINE

Solutions Store

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$50 Chat With Writer
ECFX Market

ONLINE

ECFX Market

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$50 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Strategic factor analysis summary example - What is coca cola's global strategy - 20 kiora avenue mosman nsw 2088 - Operations Management Case Analysis and Excel - Unit 8 engineering design assignment 3 answers - Address to the commonwealth club of california commonlit answers - Gale warnings irish sea - Adfast adseal 4580 series - Cardiac II and Blood Presentation - Fuxing huiyu real estate - Universal testing machine lab report - Lbs indos cell contact number - What are the main differences between job, process, and activity-based costing? - Altius golf and the fighter brand case study solution - Stronglifts 5x5 results pictures - Sighthill health centre pharmacy - Agno3 nh4oh - Sequential questions in accounting - The Role of Government and the Impact of Politics - Using hess's law to calculate net reaction enthalpy - Schizophrenia soap note - Health Policy Analysis (pick one) - Mdq decision making model - Principles of financial accounting 22nd edition answers - Naive method forecasting excel - 1 fte how many hours - Crash 2004 character analysis - Ts eliot journey of the magi essay - Advantages of self report measures - Wade davis ted talk endangered cultures - Honi soit qui mal y pense sword - Making the amazon kindle case study - Albert einstein vs stephen hawking epic rap battles of history - Waves on a string phet lab answers - Credit by assessment rasmussen - International Business - Www americanyawp reader democracy in america - Database development life cycle with example - Take a look at my girlfriend she's the only one - Managerial Accounting_Discussion4 - Rule of 9 burns - How to calculate cpk in excel - Application fair work division - RESPONSES - Deliverable 4 - Costa’s Mobile and Email Marketing Report - Sidecar global catering columbus oh - Pre socratic philosophers were primarily concerned with - Marketing - Bupa cash plan claim - How to find the possible rational roots of a polynomial - Goddards silver dip woolworths - SOCW 6361 - Calibration of venturimeter experiment - 8 steps of research process - 4.75 km in miles - Childcare 2ic job description - Wireless Network - Rasmussen accounting - Mount baw baw snow cam - Volume of rectangular box - Toshiba accounting scandal article - Ws c3850 12xs eol - Fiji water case study summary - Assignment 2: Best Practices - Differentiate between e1 and e2 mechanism - Repertoire definition to kill a mockingbird - Discussion: Needs of Active Duty and Veterans Prior to Deployment-wk7-6212 - Optimal portfolio weights excel - Access opening in primary teeth ppt - Hill country swap and barter - Lina compra zapatos italianos en el centro - Pro engineer wildfire 5 - Exercise 2-1 - “The Nightingale and the Rose” you have to choose a character from the short story and relate it to yourself - Highline university mentor program case questions - 693 am radio melbourne - Microbiology case studies mcgraw hill - HOMEWORK - Design an algorithm - Burn marlon brando full movie - Alpha beta charlie delta echo - Asexual reproduction occurs during which of the following processes - Continuing payroll problem a - A company's value chain identifies - Ifsm 300 stage 4 cic - Social media audit assignment - Amway multi level marketing - Michael mcalpin ucf - Anne lamott ted talk youtube - Nursing - Article Review exercise - Multisegment targeting strategy example - Suppose the book printing industry is competitive - How to get filthy rich in rising asia summary - C&EW6D - Mount baw baw live cam - Enterprise Risk Management - Cert ii in electrotechnology - Paper towns chapter 3 summary - Scottish outdoor education centre