Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

20 eye opening cybercrime statistics

04/12/2021 Client: muhammad11 Deadline: 2 Day

1 | Office | Faculty | Department

Week 8

Information Security

ISYS 111

Fundamentals of Business Information Systems

2 | Office | Faculty | Department

Why are we doing this?

By completing the activities in this week, you should be able to:

1. Give one specific example of each of the five factors that are contributing to the

increasing vulnerability of information resources.

2. Compare and contrast human mistakes and social engineering by way of

specific examples.

3. Describe negative consequences that might result from at least three different

kinds of deliberate attacks on information systems.

4. Assess how you might employ each of the three risk mitigation strategies in the

context of your owning a home.

5. Identify the three major types of controls that organisations can use to protect

their information resources

6. Have the database skills to establish table relationships and set field properties

3 | Office | Faculty | Department

Essential Question

What are the major threats to information security and how to minimise

them?

20 Interesting cyber crime statistics:

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

Information Security and IT

• IT, properly used can have enormous benefits for individuals,

organisations, and entire societies.

• Examples?

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
https://securityintelligence.com/20-eye-opening-cybercrime-statistics/
4 | Office | Faculty | Department

• Unfortunately, IT can also be misused, often with devastating

consequences.

• Examples?

Introduction to information security

• Security

• The degree of protection against criminal activity, danger, damage, and/or loss

• Information security

• Protecting an organisation’s information resources from un-authorised access, use, disclosure, disruption, modification, or destruction

• Threat (to an information resource)

• Any danger to which a system may be exposed

5 | Office | Faculty | Department

Introduction to information security

• Exposure (of an information resource)

• The harm, loss or damage that can result if a threat compromises that resource

• Vulnerability (of an information resource)

• The possibility that the system will be harmed by a threat

Factors that increase the vulnerability

of information resources

What are the factors that may increase the vulnerability of information

resources?

6 | Office | Faculty | Department

Five factors that increase the vulnerability

of information resources

1. Networked business environment

2. Smaller, faster, cheaper computers and storage devices

3. Decreasing skills necessary to be a hacker • New and easier tools make it very easy to attack the network

• Attacks are becoming increasingly sophisticated

4. Organised crime taking over cybercrime • Hacktivist groups: Anonymous and LulzSec

5. Lack of management support

https://en.wikipedia.org/wiki/Anonymous_(group)
https://en.wikipedia.org/wiki/LulzSec
7 | Office | Faculty | Department

Unintentional threats to information

systems

Social engineering • Attacker uses social skills to trick a legitimate employee into providing confidential

company information such as passwords

• Typically unintentional human error on the part of an employee, but it is the result of

a deliberate action on the part of an attacker

• Techniques: Tailgating, shoulder surfing

8 | Office | Faculty | Department

• Interview with Kevin Mitnick

https://www.sbs.com.au/ondemand/video/441169475950/kevin-mitnick-the-worlds-most-famous-hacker-the-feed
9 | Office | Faculty | Department

Human Errors

10 | Office | Faculty | Department

Security threats

Watch Lateline interview with Kevin

Mitnick’s: http://www.abc.net.a

u/lateline/content/20 16/s4561331.htm

(16:57 minutes)

http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
http://www.abc.net.au/lateline/content/2016/s4561331.htm
11 | Office | Faculty | Department

Deliberate threats to IS

• Espionage (practice of spying) or trespass

• Information extortion

• Sabotage or vandalism

• Theft of equipment or information

• Identity theft

• Compromises to intellectual property

• Software attacks

• Alien software (or pestware)

• Supervisory control and data acquisition (SCADA) attacks

• Cyberterrorism and cyberwarfare

12 | Office | Faculty | Department

Cyber security facts

13 | Office | Faculty | Department

14 | Office | Faculty | Department

What organisations are doing to protect information resources?

Risk management

• Risk

• The probability that a threat will impact an information resource

• Risk management

• Identify, control, and minimise the impact of threats

15 | Office | Faculty | Department

• Risk analysis

• Prioritize assets (probability x value) • Compare cost of security breach vs. cost of control

• Risk mitigation

• Organisation takes concrete actions again risk • Implement controls and develop recovery plan • 3 strategies: • Risk acceptance: (Accept the potential risk, continue operating with no controls, and absorb any

damages that occur)

• Risk limitation: Limit the risk by implementing controls that minimise the impact of threat • Risk transference: Transfer the risk by using other means to compensate for the loss, such as

purchasing insurance

16 | Office | Faculty | Department

Information security controls

Figur e 7.3

PHYSICAL CONTROLS: prevent unauthorised access

ACCESS CONTROL: restrict unauthorised access

COMMUNICATION CONTROLS : protect data

movements across network

Denial - of - service protection

Intrusion detection system

Anti - malware software

Whitelisting and blacklisting

ID system

Encryption

d Access passwor

Authentication: proof of identity

- ID

- Access Password

- Voice

Authorisation: permission to

do certain activities

- Administrator

- Regular user

- Guest

| Office | Faculty | Department

Chapter Summary

This chapter focused on

• The factors contributing to increasing vulnerability of

information

• Human mistakes and social engineering

• Deliberate attacks on information systems

• Risk mitigation and risk mitigation strategies

• Security controls used to protect

information resources

18 | Office | Faculty | Department

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

A Grade Exams
Engineering Solutions
Assignment Hub
Math Specialist
Solutions Store
ECFX Market
Writer Writer Name Offer Chat
A Grade Exams

ONLINE

A Grade Exams

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$36 Chat With Writer
Engineering Solutions

ONLINE

Engineering Solutions

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$29 Chat With Writer
Assignment Hub

ONLINE

Assignment Hub

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$38 Chat With Writer
Math Specialist

ONLINE

Math Specialist

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$46 Chat With Writer
Solutions Store

ONLINE

Solutions Store

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$50 Chat With Writer
ECFX Market

ONLINE

ECFX Market

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$50 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Country music awards sponsors - How to win capsim simulation - Ansi z535 4 arc flash - 8 vicars lane adelaide - Borders solicitors property centre - Crisis prevention intervention techniques - Eurosun solar hot water reviews - Armageddon outta here meaning - Owasp testing guide checklist - Dance - A bacteria culture initially contains cells - Artifact of human creative expression examples - Purdue owl semicolon exercises - Lorne medical centre oban - Risk Management Framework Worksheet - Tcp ip attack lab solution - Oceanview marine company 30 22 - Venturi meter experiment readings - 4 pages - Two identical particles each of mass m - David tennant hamlet act 1 scene 1 - St john's ambulance cadets uniform female - Attention getter for abortion speech - Writting a Blog - Carol ann duffy eurydice analysis - TELEWORK - Marketing researchers use tracking studies immediately before an upcoming film's release to - Colby buzzell men in black - It works global toms shoes - Speluncean explorers case analysis - 37 mort street katoomba - Escoge la opción correcta para cada oración - Myob error 13000 - There are two factories located at p and q - Race& Ethnicity - Area of a circle worksheet - Unit VIII Journal - 2 page - The world on the turtle's back - Ps 250 ferroscan system - Berton braley the will to win - Hitch dating rules - Leadership and learning are indispensable to each other essay - A trial balance before adjustments included the following - Business - Epicardial pacing wires nursing care - Business - Lexus warranty enhancement program - Https lc grad2 gcu edu learningplatform user login html - Romeo and juliet act 4 scene 2 questions and answers - Homework - Forensic Accounting - Gardner's leadership attributes - Importance of good documentation - Finance wk 3 - John callahan black mass - Swaledale retail pty ltd - Week 3 Readings: U.S. History Chapter 6, and Chapter 7. - Ashford university human resources - Caterpillar reusable hydraulic fittings - Alkaline foods list pdf - Dithered vs no dither gif - The plasma protein ____________________ is essential for coagulation - Glasgow royal infirmary audiology - Projet 1 - Physics problems - Academic Assessment Assignment - Aladdin hasp license manager service - Westongrove partnership repeat prescription - Electric hedge trimmer safety - Career development assessment and counseling model - Bank cheque commonwealth bank - Needed in 12 hours - Peninsula grange aged care - Case Analysis - Nintendo - Gopro case study marketing - Financial planning and advice - Csu online library - Hager emergency light test kit wiring diagram - Relationship between qualitative analysis and evidence based practice - Research Paper - Writing Assignment - Wageman and donnenfeld conflict intervention model - Controlled voltage source simulink - Stegbar aluminium window colour chart - Hartford research issues bonds dated january 1 - Determination of concentration by oxidation reduction titration pre lab answers - Current issue artical - Organelle observations cell lab 1 answers - Foreign body granuloma eye - Acc 202 final project part i budget variance report submission - H101 - Ethical and legal Aspects of Nursing Practice Week 2 DQ 3 - Square root of 18 - INT1010 - Week 4 discussion - Dhananjaya y chandrachud education - PEDIATRIC CASE STUDIES CHAPTER 29; GROWTH AND DEVELOPMENT OF THE ADOLESCENT - Swedbank account number format - An electric motor worksheet answers - Discussion.