Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Excel crash course exam answers

09/01/2021 Client: saad24vbs Deadline: 2 Day

1 | Office | Faculty | Department


Week 8


Information Security


ISYS 111


Fundamentals of Business Information Systems


2 | Office | Faculty | Department


Why are we doing this?


By completing the activities in this week, you should be able to:


1. Give one specific example of each of the five factors that are contributing to the


increasing vulnerability of information resources.


2. Compare and contrast human mistakes and social engineering by way of


specific examples.


3. Describe negative consequences that might result from at least three different


kinds of deliberate attacks on information systems.


4. Assess how you might employ each of the three risk mitigation strategies in the


context of your owning a home.


5. Identify the three major types of controls that organisations can use to protect


their information resources


6. Have the database skills to establish table relationships and set field properties


3 | Office | Faculty | Department


Essential Question


What are the major threats to information security and how to minimise


them?


20 Interesting cyber crime statistics:


https://securityintelligence.com/20-eye-opening-cybercrime-statistics/


Information Security and IT


• IT, properly used can have enormous benefits for individuals,


organisations, and entire societies.


• Examples?


https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

4 | Office | Faculty | Department


• Unfortunately, IT can also be misused, often with devastating


consequences.


• Examples?


Introduction to information security


• Security


• The degree of protection against criminal activity, danger, damage, and/or loss


• Information security


• Protecting an organisation’s information resources from un-authorised access, use, disclosure, disruption, modification, or destruction


• Threat (to an information resource)


• Any danger to which a system may be exposed


5 | Office | Faculty | Department


Introduction to information security


• Exposure (of an information resource)


• The harm, loss or damage that can result if a threat compromises that resource


• Vulnerability (of an information resource)


• The possibility that the system will be harmed by a threat


Factors that increase the vulnerability


of information resources


What are the factors that may increase the vulnerability of information


resources?


6 | Office | Faculty | Department


Five factors that increase the vulnerability


of information resources


1. Networked business environment


2. Smaller, faster, cheaper computers and storage devices


3. Decreasing skills necessary to be a hacker • New and easier tools make it very easy to attack the network


• Attacks are becoming increasingly sophisticated


4. Organised crime taking over cybercrime • Hacktivist groups: Anonymous and LulzSec


5. Lack of management support


https://en.wikipedia.org/wiki/Anonymous_(group)

https://en.wikipedia.org/wiki/LulzSec

7 | Office | Faculty | Department


Unintentional threats to information


systems


Social engineering • Attacker uses social skills to trick a legitimate employee into providing confidential


company information such as passwords


• Typically unintentional human error on the part of an employee, but it is the result of


a deliberate action on the part of an attacker


• Techniques: Tailgating, shoulder surfing


8 | Office | Faculty | Department


• Interview with Kevin Mitnick


https://www.sbs.com.au/ondemand/video/441169475950/kevin-mitnick-the-worlds-most-famous-hacker-the-feed

9 | Office | Faculty | Department


Human Errors


10 | Office | Faculty | Department


Security threats


Watch Lateline interview with Kevin


Mitnick’s: http://www.abc.net.a


u/lateline/content/20 16/s4561331.htm


(16:57 minutes)


http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

11 | Office | Faculty | Department


Deliberate threats to IS


• Espionage (practice of spying) or trespass


• Information extortion


• Sabotage or vandalism


• Theft of equipment or information


• Identity theft


• Compromises to intellectual property


• Software attacks


• Alien software (or pestware)


• Supervisory control and data acquisition (SCADA) attacks


• Cyberterrorism and cyberwarfare


12 | Office | Faculty | Department


Cyber security facts


13 | Office | Faculty | Department


14 | Office | Faculty | Department


What organisations are doing to protect information resources?


Risk management


• Risk


• The probability that a threat will impact an information resource


• Risk management


• Identify, control, and minimise the impact of threats


15 | Office | Faculty | Department


• Risk analysis


• Prioritize assets (probability x value) • Compare cost of security breach vs. cost of control


• Risk mitigation


• Organisation takes concrete actions again risk • Implement controls and develop recovery plan • 3 strategies: • Risk acceptance: (Accept the potential risk, continue operating with no controls, and absorb any


damages that occur)


• Risk limitation: Limit the risk by implementing controls that minimise the impact of threat • Risk transference: Transfer the risk by using other means to compensate for the loss, such as


purchasing insurance


16 | Office | Faculty | Department


Information security controls


Figur e 7.3


PHYSICAL CONTROLS: prevent unauthorised access


ACCESS CONTROL: restrict unauthorised access


COMMUNICATION CONTROLS : protect data


movements across network


Denial - of - service protection


Intrusion detection system


Anti - malware software


Whitelisting and blacklisting


ID system


Encryption


d Access passwor


Authentication: proof of identity


- ID


- Access Password


- Voice


Authorisation: permission to


do certain activities


- Administrator


- Regular user


- Guest


| Office | Faculty | Department


Chapter Summary


This chapter focused on


• The factors contributing to increasing vulnerability of


information


• Human mistakes and social engineering


• Deliberate attacks on information systems


• Risk mitigation and risk mitigation strategies


• Security controls used to protect


information resources


18 | Office | Faculty | Department


18

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Top Essay Tutor
Helping Hand
Best Coursework Help
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$65 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$60 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$60 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Which of the following is not a factor pressuring companies for local responsiveness? - Ralph begnaud cause of death - Instrumental and expressive roles - I Need Both Should be in 2 Separate documents. - Methods for documenting student progress - Deny thy father and refuse thy name literary device - Emerson network power surge protection - Legal 500 Assignment 2 - Express a as a product of elementary matrices - 300 words - Alternator bench test procedure - Everything is being dismantled reconstructed recycled - How to predict lottery numbers - Bright star jane campion analysis - Most developmentalists advocate preschool programs - Queen elizabeth ii leadership style - Stanley primary school ardrossan - Java joptionpane while loop example - Nursing leadership practicum objectives examples - Glow worm hideaway open flue - Methodology plan that will guide your research work. - Multipliers book cliff notes - Delivering healthcare in america a systems approach 7th edition - Selmer oboe serial number search - Offense cycle - Entre - Discussion - Essay - 3 2 1 exit ticket - English Writing - Cisco conditional access system - Dana hall funding a mission - Wellness worksheet 39 answers - Thermal expansion lab report - Motivational interview to facilitate health behaviour change - Aca australian counselling association - Indian horse study guide answers - Empirical formula of oxalic acid - Arc1720 - survey of architecture history - How did opponents of continental drift account - The other side is not dumb summary - Strategic importance of cloud computing in business organizations research paper - Bushmaster mars 1400 telescope - Signature Assignment: Collecting Data for Reliable Results - Dr sarah aitken vascular surgeon - Commercial law assignment example - Discussion 2 - Hack wep wifi windows - Why is it important to evaluate sources - Summarize machiavelli's beliefs about what makes a great leader - 13.1 build a computer from scratch - Excel fiber optic cable - How can you grow your intelligence - Press the button 100 times - Questions and answers about servant leadership - Contextual family therapy treatment plan - Gender Discrimination: A close investigation of its impact on employee performance in an organization. - On january ridge road company acquired - Bakers delight union road - The witches vocabulary words - How to write a rationale for a research paper - Lab 3 biodiversity - 6495.2 - Picot 3/3-2 - Half wave rectifier circuit lab report - What are mathematical observations - Sedaris me talk pretty one day - Mufti taqi usmani riba - Speed fitness test examples - Excel formula for present value of future cash flows - Vcat vic gov au renting notice - Perception in organizational behaviour ppt - Anaerobic catabolism of glucose - Denver airport automated baggage system - Laura starrett attorney jacksonville - Discussion board - On making an agreeable marriage critical reading answers - Peter johnson police scanner tasmania - Love stories april morning - Student exploration half life answer key activity b - J1 - Functional testing electrical installation - Optimum custhelp app answers list 136 138 search router - Edit My Paper Narrative Paper - 2 kings 4 18 37 - Business law - Do cell phones cause distractions in school - One page real estate executive summary - Gre verbal example questions - 400 word blog soc350 - Electrolysis the faraday and avogadro's number - HRM 522 - Nursing Statistics - Art history - The biology of osmosis jones answers - The developing person through the lifespan edition - Distance time graph worksheet - Barriers to HIT Adoption - Business Ethics (Needed In 10 hours!!!!) #95488553Business - How to calculate energy required to ionize a hydrogen atom