Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Excel crash course exam answers

09/01/2021 Client: saad24vbs Deadline: 2 Day

1 | Office | Faculty | Department


Week 8


Information Security


ISYS 111


Fundamentals of Business Information Systems


2 | Office | Faculty | Department


Why are we doing this?


By completing the activities in this week, you should be able to:


1. Give one specific example of each of the five factors that are contributing to the


increasing vulnerability of information resources.


2. Compare and contrast human mistakes and social engineering by way of


specific examples.


3. Describe negative consequences that might result from at least three different


kinds of deliberate attacks on information systems.


4. Assess how you might employ each of the three risk mitigation strategies in the


context of your owning a home.


5. Identify the three major types of controls that organisations can use to protect


their information resources


6. Have the database skills to establish table relationships and set field properties


3 | Office | Faculty | Department


Essential Question


What are the major threats to information security and how to minimise


them?


20 Interesting cyber crime statistics:


https://securityintelligence.com/20-eye-opening-cybercrime-statistics/


Information Security and IT


• IT, properly used can have enormous benefits for individuals,


organisations, and entire societies.


• Examples?


https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

4 | Office | Faculty | Department


• Unfortunately, IT can also be misused, often with devastating


consequences.


• Examples?


Introduction to information security


• Security


• The degree of protection against criminal activity, danger, damage, and/or loss


• Information security


• Protecting an organisation’s information resources from un-authorised access, use, disclosure, disruption, modification, or destruction


• Threat (to an information resource)


• Any danger to which a system may be exposed


5 | Office | Faculty | Department


Introduction to information security


• Exposure (of an information resource)


• The harm, loss or damage that can result if a threat compromises that resource


• Vulnerability (of an information resource)


• The possibility that the system will be harmed by a threat


Factors that increase the vulnerability


of information resources


What are the factors that may increase the vulnerability of information


resources?


6 | Office | Faculty | Department


Five factors that increase the vulnerability


of information resources


1. Networked business environment


2. Smaller, faster, cheaper computers and storage devices


3. Decreasing skills necessary to be a hacker • New and easier tools make it very easy to attack the network


• Attacks are becoming increasingly sophisticated


4. Organised crime taking over cybercrime • Hacktivist groups: Anonymous and LulzSec


5. Lack of management support


https://en.wikipedia.org/wiki/Anonymous_(group)

https://en.wikipedia.org/wiki/LulzSec

7 | Office | Faculty | Department


Unintentional threats to information


systems


Social engineering • Attacker uses social skills to trick a legitimate employee into providing confidential


company information such as passwords


• Typically unintentional human error on the part of an employee, but it is the result of


a deliberate action on the part of an attacker


• Techniques: Tailgating, shoulder surfing


8 | Office | Faculty | Department


• Interview with Kevin Mitnick


https://www.sbs.com.au/ondemand/video/441169475950/kevin-mitnick-the-worlds-most-famous-hacker-the-feed

9 | Office | Faculty | Department


Human Errors


10 | Office | Faculty | Department


Security threats


Watch Lateline interview with Kevin


Mitnick’s: http://www.abc.net.a


u/lateline/content/20 16/s4561331.htm


(16:57 minutes)


http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

11 | Office | Faculty | Department


Deliberate threats to IS


• Espionage (practice of spying) or trespass


• Information extortion


• Sabotage or vandalism


• Theft of equipment or information


• Identity theft


• Compromises to intellectual property


• Software attacks


• Alien software (or pestware)


• Supervisory control and data acquisition (SCADA) attacks


• Cyberterrorism and cyberwarfare


12 | Office | Faculty | Department


Cyber security facts


13 | Office | Faculty | Department


14 | Office | Faculty | Department


What organisations are doing to protect information resources?


Risk management


• Risk


• The probability that a threat will impact an information resource


• Risk management


• Identify, control, and minimise the impact of threats


15 | Office | Faculty | Department


• Risk analysis


• Prioritize assets (probability x value) • Compare cost of security breach vs. cost of control


• Risk mitigation


• Organisation takes concrete actions again risk • Implement controls and develop recovery plan • 3 strategies: • Risk acceptance: (Accept the potential risk, continue operating with no controls, and absorb any


damages that occur)


• Risk limitation: Limit the risk by implementing controls that minimise the impact of threat • Risk transference: Transfer the risk by using other means to compensate for the loss, such as


purchasing insurance


16 | Office | Faculty | Department


Information security controls


Figur e 7.3


PHYSICAL CONTROLS: prevent unauthorised access


ACCESS CONTROL: restrict unauthorised access


COMMUNICATION CONTROLS : protect data


movements across network


Denial - of - service protection


Intrusion detection system


Anti - malware software


Whitelisting and blacklisting


ID system


Encryption


d Access passwor


Authentication: proof of identity


- ID


- Access Password


- Voice


Authorisation: permission to


do certain activities


- Administrator


- Regular user


- Guest


| Office | Faculty | Department


Chapter Summary


This chapter focused on


• The factors contributing to increasing vulnerability of


information


• Human mistakes and social engineering


• Deliberate attacks on information systems


• Risk mitigation and risk mitigation strategies


• Security controls used to protect


information resources


18 | Office | Faculty | Department


18

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Top Essay Tutor
Helping Hand
Best Coursework Help
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$65 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$60 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$60 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Journey to the center of the earth movie questions - Insurance expires at the rate of 450 per month - Tkam chapter 14 summary - Econometrics 20 multiple choice questions - Persuasive speech monroe motivated sequence sample - Gay and capitalism. - 3 day food intake paper - Security Architecture and Design - Part of a tree - Amazon hot case - WEEK 3 DISCUSSION QUESTION 1 & 2 - Module 02 Quiz - Short informative speech about smoking - Static equilibrium lab report introduction - PEd1 - Reaction time experiment ruler conclusion - What is the mission statement of apple inc - 3/5 heany street mount waverley - Precipitation reactions and solubility rules lab answers - Lord of the flies chapter 2 summary - Participate in health care policy development to influence nursing practice and health care - Prince sultan university mba - What does open disclosure mean - Drs hotels pty ltd adelaide - Chapter 14 stress lifestyle and health - The Corrections System - 1100 words Due 9/28/2020 Advantages and disadvantages of probability vs. non-probability sampling in research - Glencoe virtual lab enzyme controlled reactions - Investment Firm cybercrime risk assesment - Ray charles innovation in soul music was the combination of - Fusion welding vs solid state welding - What are derivatives used for in the real world - Global supply chain management simulation - Lupe rosa y tomás son bueno amigos - Miles into kilometers formula - Race the power of an illusion episode 3 discussion questions - How to write an educational platform - Synthesis Paper - Taser international inc v ward - Bill nye greatest discoveries plate tectonics - What is the distance between moab and bethlehem - Nike inc cost of capital case study - Magazine cover dimensions photoshop - Dove body wash 34 oz walmart - Shopfront youth legal centre - Chinese flame tree leaves - Sex lies and conversation by deborah tannen - Case study on performance management with questions and answers - Birmingham and district chess league - Hound of the baskervilles discussion questions - Homework - Precalculus transformations cheat sheet - Plan de mercadotecnia de coca cola - Action research - Peruvian flame rump tarantula care sheet - Im3 dental machine maintenance - Herbert l smith broward county - Elimination of unrealized profit on intercompany sales of inventory - Cultural relativism and universal human rights by carolyn fluehr lobban - Annotated bibliography - Computer Science - Chapter 12 the strategy of international business - Jessica gutierrez 30th ward - The research paper should be based on a topic discussed in the course. - Nursing Research Methods - SPSS - Fidelis capital markets coimbatore - Fridge magnets and pacemakers - Outsourcing pros and cons forbes - Sports in society issues and controversies 12th edition citation - Fawaz fadi lsus - System integration case study - Case Study: Mrs. J - Week5 Community Nurse - Crc church cape town - Chick fil a gift card balance - 1x0123 - What is fortunato's weakness - Residential valuation report sample - Why did miss gulch want to take toto away - Ethernet cable color order - What value is a discontinuity of x squared plus 5 x plus 2, all over x squared plus 2 x minus 35? - Biotic and abiotic components of ecosystem - 100 in standard form - Girl before a mirror meaning - Reading and Writing Assignment - St augustines primary school wodonga - Diploma of anaesthetic technology - Discussion post - Reefer container power supply - 6.22 miles in km - Breaking night liz murray sparknotes - Chapter 10 - Internal wall insulation systems - Biology data analysis questions - Dual output buck boost converter - Shopping decisions chapter 11 study sheet - Be paper - Research paper - Value chain analysis in management accounting