Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

20 eye opening cybercrime statistics

04/12/2021 Client: muhammad11 Deadline: 2 Day

1 | Office | Faculty | Department

Week 8

Information Security

ISYS 111

Fundamentals of Business Information Systems

2 | Office | Faculty | Department

Why are we doing this?

By completing the activities in this week, you should be able to:

1. Give one specific example of each of the five factors that are contributing to the

increasing vulnerability of information resources.

2. Compare and contrast human mistakes and social engineering by way of

specific examples.

3. Describe negative consequences that might result from at least three different

kinds of deliberate attacks on information systems.

4. Assess how you might employ each of the three risk mitigation strategies in the

context of your owning a home.

5. Identify the three major types of controls that organisations can use to protect

their information resources

6. Have the database skills to establish table relationships and set field properties

3 | Office | Faculty | Department

Essential Question

What are the major threats to information security and how to minimise

them?

20 Interesting cyber crime statistics:

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

Information Security and IT

• IT, properly used can have enormous benefits for individuals,

organisations, and entire societies.

• Examples?

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
4 | Office | Faculty | Department

• Unfortunately, IT can also be misused, often with devastating

consequences.

• Examples?

Introduction to information security

• Security

• The degree of protection against criminal activity, danger, damage, and/or loss

• Information security

• Protecting an organisation’s information resources from un-authorised access, use, disclosure, disruption, modification, or destruction

• Threat (to an information resource)

• Any danger to which a system may be exposed

5 | Office | Faculty | Department

Introduction to information security

• Exposure (of an information resource)

• The harm, loss or damage that can result if a threat compromises that resource

• Vulnerability (of an information resource)

• The possibility that the system will be harmed by a threat

Factors that increase the vulnerability

of information resources

What are the factors that may increase the vulnerability of information

resources?

6 | Office | Faculty | Department

Five factors that increase the vulnerability

of information resources

1. Networked business environment

2. Smaller, faster, cheaper computers and storage devices

3. Decreasing skills necessary to be a hacker • New and easier tools make it very easy to attack the network

• Attacks are becoming increasingly sophisticated

4. Organised crime taking over cybercrime • Hacktivist groups: Anonymous and LulzSec

5. Lack of management support

https://en.wikipedia.org/wiki/Anonymous_(group)
https://en.wikipedia.org/wiki/LulzSec
7 | Office | Faculty | Department

Unintentional threats to information

systems

Social engineering • Attacker uses social skills to trick a legitimate employee into providing confidential

company information such as passwords

• Typically unintentional human error on the part of an employee, but it is the result of

a deliberate action on the part of an attacker

• Techniques: Tailgating, shoulder surfing

8 | Office | Faculty | Department

• Interview with Kevin Mitnick

https://www.sbs.com.au/ondemand/video/441169475950/kevin-mitnick-the-worlds-most-famous-hacker-the-feed
9 | Office | Faculty | Department

Human Errors

10 | Office | Faculty | Department

Security threats

Watch Lateline interview with Kevin

Mitnick’s: http://www.abc.net.a

u/lateline/content/20 16/s4561331.htm

(16:57 minutes)

http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
11 | Office | Faculty | Department

Deliberate threats to IS

• Espionage (practice of spying) or trespass

• Information extortion

• Sabotage or vandalism

• Theft of equipment or information

• Identity theft

• Compromises to intellectual property

• Software attacks

• Alien software (or pestware)

• Supervisory control and data acquisition (SCADA) attacks

• Cyberterrorism and cyberwarfare

12 | Office | Faculty | Department

Cyber security facts

13 | Office | Faculty | Department

14 | Office | Faculty | Department

What organisations are doing to protect information resources?

Risk management

• Risk

• The probability that a threat will impact an information resource

• Risk management

• Identify, control, and minimise the impact of threats

15 | Office | Faculty | Department

• Risk analysis

• Prioritize assets (probability x value) • Compare cost of security breach vs. cost of control

• Risk mitigation

• Organisation takes concrete actions again risk • Implement controls and develop recovery plan • 3 strategies: • Risk acceptance: (Accept the potential risk, continue operating with no controls, and absorb any

damages that occur)

• Risk limitation: Limit the risk by implementing controls that minimise the impact of threat • Risk transference: Transfer the risk by using other means to compensate for the loss, such as

purchasing insurance

16 | Office | Faculty | Department

Information security controls

Figur e 7.3

PHYSICAL CONTROLS: prevent unauthorised access

ACCESS CONTROL: restrict unauthorised access

COMMUNICATION CONTROLS : protect data

movements across network

Denial - of - service protection

Intrusion detection system

Anti - malware software

Whitelisting and blacklisting

ID system

Encryption

d Access passwor

Authentication: proof of identity

- ID

- Access Password

- Voice

Authorisation: permission to

do certain activities

- Administrator

- Regular user

- Guest

| Office | Faculty | Department

Chapter Summary

This chapter focused on

• The factors contributing to increasing vulnerability of

information

• Human mistakes and social engineering

• Deliberate attacks on information systems

• Risk mitigation and risk mitigation strategies

• Security controls used to protect

information resources

18 | Office | Faculty | Department

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

A Grade Exams
Engineering Solutions
Assignment Hub
Math Specialist
Solutions Store
ECFX Market
Writer Writer Name Offer Chat
A Grade Exams

ONLINE

A Grade Exams

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$36 Chat With Writer
Engineering Solutions

ONLINE

Engineering Solutions

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$29 Chat With Writer
Assignment Hub

ONLINE

Assignment Hub

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$38 Chat With Writer
Math Specialist

ONLINE

Math Specialist

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$46 Chat With Writer
Solutions Store

ONLINE

Solutions Store

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$50 Chat With Writer
ECFX Market

ONLINE

ECFX Market

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$50 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Mock drill observation checklist - Defence force recruiting aptitude test - Clean room cleaning sop - Vcaa exams 2021 timetable - 7-9 countess street mosman - Manger owl finance - Internal factors of samsung - Neisser 1967 cognitive psychology - Merritt's bakery case study - From forth the fatal loins of these two foes - The little eagle handbook with exercises - Strategic Plan - 2 bit up down counter jk flip flop - Cryptography - Woolworths third party fire and theft insurance - Madison central high school - Higher business past paper - Lesson 4.7 flowchart thinking answers - Human services roles and responsibilities - Eyelash client consultation form - International seminary plymouth florida - Iso 27001 requirements checklist - Proflex thermal cycler manual - Identify examples of loaded language and ambiguous language - What does sociological perspective mean - Automatic brightness control in fluoroscopy - NUR501- REPLY TO NICOLE - How to calculate population density per square mile - Case Study due Monday - If i told him gertrude stein - Disney erp system - Iom future of nursing 2020 - What is a directive leader - Discussion 7 - Desc model conflict resolution - 3.9 k resistor color code - I have dreamed a dream les miserables - Value Creation in Organizations - Without exaggeration crossword clue - Kounin model of discipline pdf - Hendrix - Binding of isaac wrath of the lamb items wiki - +91-8306951337 love marriage specialist astrologer IN Aurangabad - Tract of peaty wasteland - St annes childrens centre - The ethics resource center - Smoothing your transition from rn to np - City hall case study - Latitude and longitude of volcanoes - Fst 7 back evogen - Express your answer as an isotope - Cambridge pembroke study abroad - Partner with Leading Christian Book Publishers - Robin hood case study swot analysis - How to find less dividends - Swansea uni college of science intranet - Maternal and Child Health - Aldi payment methods australia - Elements of longer messages report analysis - Ethics in information technology ppt - Distinguish between discretionary fixed costs and committed fixed costs - Nursing - Poor little faith thought he - Pre lab for build an atom - Jamaica hospital psychiatry residency - Medicare item number 00023 - Peyton approved trial balance 2018 - Personal interest project society and culture - What does the word christian mean - ECON Forum Replies - Fluid mechanics lab report example - Best sound level meter app for android - 3.7 km in miles - Nuffield dyspraxia programme manual - Adam and eve albrecht durer function - Blue lake walk kosciuszko - ?? same-day +27833173182 MOHALE'S HOEK ABORTION CLINIC // PILLS,,,, - Cinema symbolism pdf - Admn2 - Illusions richard bach chapter summaries - Reading reflection - Gopro be a hero marketing campaign - Opening a restaurant in Queens New York - Sarin and o connor 2009 article - Royal college of surgeons in ireland notable alumni - Answering two questions - Hansson private label case - Hebrew vs greek thinking - Kodak hero 9.1 online printer management tool - Cost of production report problems and solutions - Your firm is contemplating the purchase of a new - Kay magill company had the following adjusted trial balance - Exam timetable release monash - Mark 8 29 worksheet gcu - Differentiate between an analog and a digital electromagnetic signal - How is the atar calculated sa - 1277 kiewa valley highway - Gcse music structure and form - Area of equilateral triangle with apothem - Ian fisk country music gig guide