Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Excel crash course exam answers

09/01/2021 Client: saad24vbs Deadline: 2 Day

1 | Office | Faculty | Department


Week 8


Information Security


ISYS 111


Fundamentals of Business Information Systems


2 | Office | Faculty | Department


Why are we doing this?


By completing the activities in this week, you should be able to:


1. Give one specific example of each of the five factors that are contributing to the


increasing vulnerability of information resources.


2. Compare and contrast human mistakes and social engineering by way of


specific examples.


3. Describe negative consequences that might result from at least three different


kinds of deliberate attacks on information systems.


4. Assess how you might employ each of the three risk mitigation strategies in the


context of your owning a home.


5. Identify the three major types of controls that organisations can use to protect


their information resources


6. Have the database skills to establish table relationships and set field properties


3 | Office | Faculty | Department


Essential Question


What are the major threats to information security and how to minimise


them?


20 Interesting cyber crime statistics:


https://securityintelligence.com/20-eye-opening-cybercrime-statistics/


Information Security and IT


• IT, properly used can have enormous benefits for individuals,


organisations, and entire societies.


• Examples?


https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

https://securityintelligence.com/20-eye-opening-cybercrime-statistics/

4 | Office | Faculty | Department


• Unfortunately, IT can also be misused, often with devastating


consequences.


• Examples?


Introduction to information security


• Security


• The degree of protection against criminal activity, danger, damage, and/or loss


• Information security


• Protecting an organisation’s information resources from un-authorised access, use, disclosure, disruption, modification, or destruction


• Threat (to an information resource)


• Any danger to which a system may be exposed


5 | Office | Faculty | Department


Introduction to information security


• Exposure (of an information resource)


• The harm, loss or damage that can result if a threat compromises that resource


• Vulnerability (of an information resource)


• The possibility that the system will be harmed by a threat


Factors that increase the vulnerability


of information resources


What are the factors that may increase the vulnerability of information


resources?


6 | Office | Faculty | Department


Five factors that increase the vulnerability


of information resources


1. Networked business environment


2. Smaller, faster, cheaper computers and storage devices


3. Decreasing skills necessary to be a hacker • New and easier tools make it very easy to attack the network


• Attacks are becoming increasingly sophisticated


4. Organised crime taking over cybercrime • Hacktivist groups: Anonymous and LulzSec


5. Lack of management support


https://en.wikipedia.org/wiki/Anonymous_(group)

https://en.wikipedia.org/wiki/LulzSec

7 | Office | Faculty | Department


Unintentional threats to information


systems


Social engineering • Attacker uses social skills to trick a legitimate employee into providing confidential


company information such as passwords


• Typically unintentional human error on the part of an employee, but it is the result of


a deliberate action on the part of an attacker


• Techniques: Tailgating, shoulder surfing


8 | Office | Faculty | Department


• Interview with Kevin Mitnick


https://www.sbs.com.au/ondemand/video/441169475950/kevin-mitnick-the-worlds-most-famous-hacker-the-feed

9 | Office | Faculty | Department


Human Errors


10 | Office | Faculty | Department


Security threats


Watch Lateline interview with Kevin


Mitnick’s: http://www.abc.net.a


u/lateline/content/20 16/s4561331.htm


(16:57 minutes)


http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

http://www.abc.net.au/lateline/content/2016/s4561331.htm

11 | Office | Faculty | Department


Deliberate threats to IS


• Espionage (practice of spying) or trespass


• Information extortion


• Sabotage or vandalism


• Theft of equipment or information


• Identity theft


• Compromises to intellectual property


• Software attacks


• Alien software (or pestware)


• Supervisory control and data acquisition (SCADA) attacks


• Cyberterrorism and cyberwarfare


12 | Office | Faculty | Department


Cyber security facts


13 | Office | Faculty | Department


14 | Office | Faculty | Department


What organisations are doing to protect information resources?


Risk management


• Risk


• The probability that a threat will impact an information resource


• Risk management


• Identify, control, and minimise the impact of threats


15 | Office | Faculty | Department


• Risk analysis


• Prioritize assets (probability x value) • Compare cost of security breach vs. cost of control


• Risk mitigation


• Organisation takes concrete actions again risk • Implement controls and develop recovery plan • 3 strategies: • Risk acceptance: (Accept the potential risk, continue operating with no controls, and absorb any


damages that occur)


• Risk limitation: Limit the risk by implementing controls that minimise the impact of threat • Risk transference: Transfer the risk by using other means to compensate for the loss, such as


purchasing insurance


16 | Office | Faculty | Department


Information security controls


Figur e 7.3


PHYSICAL CONTROLS: prevent unauthorised access


ACCESS CONTROL: restrict unauthorised access


COMMUNICATION CONTROLS : protect data


movements across network


Denial - of - service protection


Intrusion detection system


Anti - malware software


Whitelisting and blacklisting


ID system


Encryption


d Access passwor


Authentication: proof of identity


- ID


- Access Password


- Voice


Authorisation: permission to


do certain activities


- Administrator


- Regular user


- Guest


| Office | Faculty | Department


Chapter Summary


This chapter focused on


• The factors contributing to increasing vulnerability of


information


• Human mistakes and social engineering


• Deliberate attacks on information systems


• Risk mitigation and risk mitigation strategies


• Security controls used to protect


information resources


18 | Office | Faculty | Department


18

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Top Essay Tutor
Helping Hand
Best Coursework Help
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$65 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$60 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$60 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

The external genitalia of the female are collectively called - Latent heat of freezing - Cj industries and heavey pumps case study - How does pig latin work - Army blc sharp essay - Week 3 project - James 3 1 12 - Writter - Social impact of technology assignment - Percy jackson chapter 6 questions and answers - OB Paper - What gives a firm tight control for coordinating a globally dispersed value chain? - I need 12 pages due 48 jours - Human services in the criminal justice system trends evaluation - When i heard the learn d astronomer meaning - Lash and brow boudoir 204 church st richmond vic 3121 - Denzel Brooks Opens A Web Consulting Business Called Venture Consultants And Completes The Following Transactions In March: - How many shekels per dollar - Combinations and permutations in python - 3 am matchbox 20 - How to calculate mean path length of core - High performance development model interview questions - Cooks mill camping area - Trevor noah mother patricia alive - Apply 3.1 - Strata titles regulations wa - 2303 vardon lane sanctuary cove - American standard freedom 90 flash codes - New heritage doll company capital budgeting simulation - A job order cost system - Difference between product and service marketing ppt - Trends and issues in hospitality and tourism industry - Paper - MISS PROFESSOR ONLY - Reasons to donate blood speech - Webinars - Fleet service clerk duties - Week 2 Journal - 73 489 in expanded form - Shipper's export declaration fedex - Discussion: Analyzing a Health-Related Scenario - Dbi to watts calculator - Take me to a higher ground - CJUS 420 DB FORUM 7 THREAD due 10/7/2020 - Field service engineer job description - Leadership Theories in Practice - Colligative properties of solutions experiment - According to sternberg's triangular theory of love, the most complete, ideal type of love is - My nissan maxima won t start - An electric motor worksheet answers - Discussions - Bmr assignment 5 answers - Research Essay on Women's Health Care - Everyday use characterization - Bubble gum challenge rules - Apa formatted health care systems - Netstumbler access denied windows 7 - Analytical chemistry instruments - Mr barton maths m1 - Difference between pessaries and suppositories - Identifying and correcting sentence fragments - Homework - Label parts of an egg worksheet - The pioneers of a warless world - What device appears in the vet advice to the narrator - During its first year of operations the mccollum corporation - Nike commodity chain - Nate's classroom has three tables of different lengths - Excel traffic light conditional formatting percentage - How to install excel qm - Job safety analysis worksheet - Reading response - C228 task 2 epidemiological determinants - English writing practical - How to find volume of a 3d shape - What is a strong entity - Kenosha - Give me liberty eric foner second edition - Which ventral cavity subdivision has no bony protection - Sisters of st joseph lochinvar - PowerPoint on Paplau's nursing theory interpersonal, therapeutic process that takes place when professionals, specifically educated to be nurses, engage in therapeutic relationships with people who are in need of health services. - Fm mattsson mixer cartridge - Ways to fix AirPods Pro crackling sound issue - Horder thorley funeral notices - Vce oral presentation topics 2021 - Necesitas la definición de un flan - Cinnabar gmc motorhome parts - Clinical Field Experience D: Instructional Strategies ( No plags ) - Flipkart ebay merger case study - Business analytics data analysis and decision making cengage pdf - Nursing Leadership paper - Lab 1 introduction to science exercise 7 - Assignment - Conducting Effective Interviews - Cockatiels for sale gold coast - 5.04 understanding 20th century poetry - Enterprise risk management - Agile - Module - Tesla strategic business units