Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Excel crash course exam answers

09/01/2021 Client: saad24vbs Deadline: 2 Day

1 | Office | Faculty | Department


Week 8


Information Security


ISYS 111


Fundamentals of Business Information Systems


2 | Office | Faculty | Department


Why are we doing this?


By completing the activities in this week, you should be able to:


1. Give one specific example of each of the five factors that are contributing to the


increasing vulnerability of information resources.


2. Compare and contrast human mistakes and social engineering by way of


specific examples.


3. Describe negative consequences that might result from at least three different


kinds of deliberate attacks on information systems.


4. Assess how you might employ each of the three risk mitigation strategies in the


context of your owning a home.


5. Identify the three major types of controls that organisations can use to protect


their information resources


6. Have the database skills to establish table relationships and set field properties


3 | Office | Faculty | Department


Essential Question


What are the major threats to information security and how to minimise


them?


20 Interesting cyber crime statistics:


https://securityintelligence.com/20-eye-opening-cybercrime-statistics/


Information Security and IT


• IT, properly used can have enormous benefits for individuals,


organisations, and entire societies.


• Examples?


https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

4 | Office | Faculty | Department


• Unfortunately, IT can also be misused, often with devastating


consequences.


• Examples?


Introduction to information security


• Security


• The degree of protection against criminal activity, danger, damage, and/or loss


• Information security


• Protecting an organisation’s information resources from un-authorised access, use, disclosure, disruption, modification, or destruction


• Threat (to an information resource)


• Any danger to which a system may be exposed


5 | Office | Faculty | Department


Introduction to information security


• Exposure (of an information resource)


• The harm, loss or damage that can result if a threat compromises that resource


• Vulnerability (of an information resource)


• The possibility that the system will be harmed by a threat


Factors that increase the vulnerability


of information resources


What are the factors that may increase the vulnerability of information


resources?


6 | Office | Faculty | Department


Five factors that increase the vulnerability


of information resources


1. Networked business environment


2. Smaller, faster, cheaper computers and storage devices


3. Decreasing skills necessary to be a hacker • New and easier tools make it very easy to attack the network


• Attacks are becoming increasingly sophisticated


4. Organised crime taking over cybercrime • Hacktivist groups: Anonymous and LulzSec


5. Lack of management support


https://en.wikipedia.org/wiki/Anonymous_(group)

https://en.wikipedia.org/wiki/LulzSec

7 | Office | Faculty | Department


Unintentional threats to information


systems


Social engineering • Attacker uses social skills to trick a legitimate employee into providing confidential


company information such as passwords


• Typically unintentional human error on the part of an employee, but it is the result of


a deliberate action on the part of an attacker


• Techniques: Tailgating, shoulder surfing


8 | Office | Faculty | Department


• Interview with Kevin Mitnick


https://www.sbs.com.au/ondemand/video/441169475950/kevin-mitnick-the-worlds-most-famous-hacker-the-feed

9 | Office | Faculty | Department


Human Errors


10 | Office | Faculty | Department


Security threats


Watch Lateline interview with Kevin


Mitnick’s: http://www.abc.net.a


u/lateline/content/20 16/s4561331.htm


(16:57 minutes)


http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

11 | Office | Faculty | Department


Deliberate threats to IS


• Espionage (practice of spying) or trespass


• Information extortion


• Sabotage or vandalism


• Theft of equipment or information


• Identity theft


• Compromises to intellectual property


• Software attacks


• Alien software (or pestware)


• Supervisory control and data acquisition (SCADA) attacks


• Cyberterrorism and cyberwarfare


12 | Office | Faculty | Department


Cyber security facts


13 | Office | Faculty | Department


14 | Office | Faculty | Department


What organisations are doing to protect information resources?


Risk management


• Risk


• The probability that a threat will impact an information resource


• Risk management


• Identify, control, and minimise the impact of threats


15 | Office | Faculty | Department


• Risk analysis


• Prioritize assets (probability x value) • Compare cost of security breach vs. cost of control


• Risk mitigation


• Organisation takes concrete actions again risk • Implement controls and develop recovery plan • 3 strategies: • Risk acceptance: (Accept the potential risk, continue operating with no controls, and absorb any


damages that occur)


• Risk limitation: Limit the risk by implementing controls that minimise the impact of threat • Risk transference: Transfer the risk by using other means to compensate for the loss, such as


purchasing insurance


16 | Office | Faculty | Department


Information security controls


Figur e 7.3


PHYSICAL CONTROLS: prevent unauthorised access


ACCESS CONTROL: restrict unauthorised access


COMMUNICATION CONTROLS : protect data


movements across network


Denial - of - service protection


Intrusion detection system


Anti - malware software


Whitelisting and blacklisting


ID system


Encryption


d Access passwor


Authentication: proof of identity


- ID


- Access Password


- Voice


Authorisation: permission to


do certain activities


- Administrator


- Regular user


- Guest


| Office | Faculty | Department


Chapter Summary


This chapter focused on


• The factors contributing to increasing vulnerability of


information


• Human mistakes and social engineering


• Deliberate attacks on information systems


• Risk mitigation and risk mitigation strategies


• Security controls used to protect


information resources


18 | Office | Faculty | Department


18

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Top Essay Tutor
Helping Hand
Best Coursework Help
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$65 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$60 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$60 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Ender's game google drive - Non experimental approach in psychology - Assignment - Alpha decay equations worksheet - Then i attended morris junior high - Baking soda and hydrochloric acid lab - National safety compliance quiz answers 14 027 - As the twig is bent so grows the tree meaning - Facebook port fairy community notice board - Does stiles have adhd - Pure nuff stuff sunscreen - Botryosphaeria dothidea dragon fruit treatment - United states v microsoft antitrust case summary - Environmental effects of the hoover dam - Jeff daniels the newsroom america is not the greatest - Chubb fire extinguisher training - Khan academy plate tectonics - Ermo chinese film - PSY 330 Theories of Personality week one discussion - Database IT244 - Geeky medics shoulder exam - Scott fishers body on everest - Optimizing Your Walmart FBA Listings for Maximum Visibility - Examples of euphonious words - Discussion Reponses (#2) - Fortune telling fish experiment - Biology equations and formulas - Fantastic voyage white blood cell - Ritz carlton competition - Gillette india annual report - Discussion 2 - Acc 202 final project presentation to investors - Parkland primary school bradford - Grey goose case study - Carl sagan baloney detection kit - Vivid seats luke bryan hamilton - Technogym low row pure strength - The total variable cost of producing 5 units is - ASSIGNMENT 8/9/20 - Number of neutrons in phosphorus - Smashed gladys legs up lyrics - Fedex approaches quality management from which of the following perspectives - Math is fun platonic solids - Allison automatic fault codes - Redbank secure children's home - Blood pressure conversion kpa to mmhg - Pnb properties for sale - Watch a movie and Answer some simple questions - Essentials of accounting continuous problem solution - Midtronics exp 1050 software update - Qnt 275 week 3 quiz answers - Latin future tense endings - How to email your teacher saying you re sick - The virginia cooperative extension reports that the mean weight - Central nervous system - Econ hw - Sound devices in sonnet 18 - The raid 2 prison fight - I NEED SOMEONE TO WRITE ME THE BEST COVER LETTER FOR AN INTERNSHIP - Organizational behavior stephen p robbins 15th edition ppt - What is your leadership philosophy - Applied Science - Creativity innovation and design rmit - Joy luck club characters - Brave new world chapter summary - 1652 kj to calories - Excel Homework 2 - Who is avery brown in the piano lesson - Deliverable 3 - Kingston-Bryce Risk Mitigation Plan - Wk 10 - Examples of reporting verbs in academic writing - Timed Statistics Test - The square root of 1000 - ENGLISH GRAMMER - Fad examples in fashion - What is a mco in healthcare - Midwife standards for practice - Toshiba hw setup utility for windows 10 - Anth5 - What are the six images of change managers - Disscuion - Australian steel section properties - Help with paper - +971561686603 Abortion pills in Dubai/Abu Dhabi-mifepristone & misoprostol in DUBAI - Unit 8 Data Analysis and Application - Jobvite social recruiting survey 2015 - Psychology questions - Pwdump for windows 10 - What should you do about an insubordinate employee - 47 ronin the true story - Crescendo management pty ltd v westpac banking corporation - FIN534 Week7 Assignment Part 1 (2 pages) - 360 tomahawk dr maumee oh 43537 - Master bilt controller manual - Discussion question - Australian unity health cover - Cost behavior analysis example - Microsoft's search case study summary - Tukey's hinges or weighted average - Nielsen bases factors for success