Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

LAVANYA C&I-converted - 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

INFORMATION

SECURITY ATTACKS
Creativity
Creativity is the act of turning of new and imaginative ideas into reality-creativity is
characterized by the ability to perceive the world in new ways, to find hidden patterns ,to make
connections between seemingly unrelated phenomena,and to generate solutions .creativity is the
ability to develop and express ourselves and our ideas in new ways . it can be defined in many
ways , such as such as how a person explores ideas of uses different ways to slove the issues and
how one experiences life .
Innovation
Innovation in its modern meaning is “ a new idea, creative thought ,new imagination in firm of
devices or method” Innovation is often also viewed as the application of better solution that meet
New requirements in particular needs or existing market needs .The process of translating an
idea or invention into a good or service that creates value or for which customer will pay….
Brain storming
: Brain storming is a group creativity technique by which efforts are made to find a conclusion
for a specific problem by gathering a list of ideas spontaneously contribution by its members…
people are able to think more freely and they suggest as many spontaneous new ideas as
possible. It is the process of free thinking and generating ideas without being bound by restraints
such as “Is this a good or bad ideas? Is one of the best – known techniques available for creative
problem solving Innovation:
PROBLEM :
Information Security Attacks
AIM :
Security Assurance Is Essential To Enabling A Network To Perform Its Intended Function
Security Attacks

PROCEDURE :
INTRODUCTION
Information security isn’t all approximately securing records from unauthorized get admission
to . Information security is largely the excersise of stopping unauthorized get admission to, use,
disclosure , modification, inspection , regarding or destruction of records. Information can we
physical or electric one . Information can be something like ur details or we can say your profile
on social media , your statistics in cell phone your biometrics and many others .a Thus
information security spans such a lot of studies areas like cryptography , mobile computing ,
cyber forensics , online social media and so on .
Information security programs are build around 3 objectives ,commonly known as CIA-
confidentiality, integrity, availability

1.confidentiality – means information is not disclosed to unauthorized individuals, entities and


process

2.Integrity- means maintaining accuracy and completeness of data. This meaning data cannot
be edited in an unauthorized way.

3.Availability- means information must be available when needed.

DEFINATION OF INFORMATION SECURITY SYSTEM –“An INFORMATION SECURITY SYSTEM is


a set of irrealated components that works together to collect,process ,to store and
breakdown the ingormation to support decision making”

DIMENSIONS OF INFORMATION SECURITY SYSTEM


Organizational Dimension:
Information system are part of agency . Information system can have the usual working manner
and lifestyle of an agency embedded inside them . These entails

a) Functional specialities

b) Business approaches

c) Culture

d) Political hobby corporation

Management Dimension
Managers perceive Enterprise challenges in the surrounding. Information structure supply
equipment and statistics wished by the manager to allocate , coordinate and reveal their
paintings , make choice , creative new products and services and make lengthy range strategic
decision .

Technology Dimension
Management uses era to perform there functions. It consists of laptop hardware , software
program date control era , networking / Telecom generation .it’s one of the many tools
managers use to cope with the trade .
Types of Information security system
1) Transaction processing system (TPS):
Transaction processing system are record device that strategies information
resulting from the occurrences of commercial enterprises transaction

The transaction is performed in two approaches :Batching process and online


transaction processing

2) Management information system (MIS)


Management information system is designed to take exceed raw information to be had
through transaction processing system and convert them write into a summarize and
aggregated for the supervisor , normally in a record layout

Many exceptional sorts of report are produced in MIS. And some of the reviews are
precise file , on call for record , ad-hoc and n exception file

3) Decision support system (DSS):


Decision support system contains gear and strategies to assist in accumulating relevant facts
and examine the alternative and option s the give up user is more concerned in creating DSS an
MIS .

4) Export system :
Export system include know how in order to useful to resource managers in diagnosing
problems or in Hassel solving .This structure are based on the concept of synthetic intelligent
studies

ATTACKS IN INFORMATION SECURITY SYSTEM


➢ Active and passive attacks in information security system
Active and passive attacks in information security active attacks . An active attacks
attempts to regulate gadget resources or effect their operations . Active attacks contains a few
amendment of the information circulate or Advent of false statement types of lively attacks are
as following
ACTIVE ATTACKS
• Masquerade
Masquerade assault takes area one entity pretend to be one of kind entity .A masquerade
assault includes one of the different form of energetic attacks .

• Modification of messages
It manner that some portion of a message or altered that message is delete or reordered to
supply on unauthorised affect

• Denial of service
It prevents regular use of conversation facilities these assault may additionally h e a specific
Target for instance an entity might also suppress all messages directed to a particular
destination

Passive attacks
A passive assault attempt to analyze make use of information from the machine however
does not affect system resources .passive attacks are in the nature of eaves dropping or
monetoring of transmission .The goal of the oponant is to achieve data is being transmitted
.Types of passive assault are as following

• Traffic analysis
Suppose that we have an manner of masking of information , so that the attacker even
supposing captured the message could not extract any information from the message

DIFFERENT TYPES OF INFORMATION SECURITY ATTACKS


Attack can be whatever which can take gain of vulnerability to breach safety and natively
regulate , earse damage item or gadget of interest.software attacks manner assault through
virusevery business is underconstant for a large .

For instance , as noted through main antivirus agency Kaspersky lab , “The variety of latest
malicious files proced by Kaspersky labs in lab detection technology reached 3,60000 a day in
2017 that’s 250 new malware threats every minute malware is a combination of two phrases
malicious and software . So malware basically a malicious software that can be perform
malicious operation on system , Malware can be divided into two clauses :
• Inspection methods
• Malware actions

Malware on the idea of infection method are following:

• Virus
They have the capacity to copy themselves with the aid of hooking them to the program on the
host computer like songs , videos and so forth after which all around the internet .there creeper
virus was first detected ARPANETMalware on the idea of action :

• Adware
_adware isn’t always precisely malicious but they do breach privateness of the users. They
display advertisements on pcs computer or inner man or woman packages. They come attached
with free to apply software consequently most important source of sales for such builders.
They monitor your pursuits and show relevant advertisements.

• Spyware_
it is a application or we can say a software that video display units your activities on computer
and reveal amased records to involved party. Spyware are commonly dropped by using trojans,
viruses or worms. Once dropped they installs themselves and sits silently to keep away from
detection.

One of the maximum common instance of adware KEYLOGGER. The primary task of keylogger is
to record user keystroks with timestamp. Thus shooting interesting records like user name,
password, credit card information and so forth.

• Ransomeware_
it is sort of Malware in order to either encrypt your documents or will lock your
computer making it inaccessible both partially or fully then a screen will
beansomeware_ it is kind of Malware on the way to both encrypt your files or will lock
your computer making it in accessible both partly or totally.
• Scareware_

IT masquerades as a tool assist fix your device however when the software program is
achieved it’s going to infect your device or completely smash it. The software will show
a message to frighten you and force to take some movement like pay them to restore
your machine.
• Rootkits_
Designed to benefit root get right of entry to or we will say administrative privileges
with in the consumer gadget. Once received the basis get admission to, the exploiter
can do anything from stealing non - public files to non-public information.
• Zombies-
THE painting similar to Spyware. Infection mechanism is equal however they don’t spy
and steal facts as an alternative they await the command from hackers.

Below is the brief description of those NEW ERA THREATS.

➢ Technology with vulnerable safety-


With the advertisement in era, with each passing day a new system is being released inside
the marketplace. Since the market is very aggressive security thing is compromised to make
device more updated. This ends in robbery of statistics /facts from the gadgets

➢ Social Media attacks –


In this cyber criminals identify and infect a cluster of web sites that people of a particular
enterprise go to, to steal facts. Mobile Malware – there is a announcing while there is a
connectivity to Internet there may be risk to security. Same is going to mobile phones where in
gaming packages are designed to entice customer to down load the game and by accident they
may installation Malware or virus in the tool.

➢ Outdated security software –


With new threats emerging ordinary, updation in security software program is a pre requisite
to have a totally secured environment. Corporate statistics on non public device – these days
every agency follows a rule BYOD. BYOD manner bring your personal devices like laptops,
tablets to the place of job. Clearly BYOD pose a severe risk to safety of information however
because of productivity issues corporations are arguing to undertake this.

➢ Social Engineering –
IS The artwork of manipulating humans in order that they give up their private data like
financial institution account details, password and many others.

RESOURCES OF INFORMATION SYSTEM :


✓ Hard ware
✓ Software
✓ People
✓ Data
✓ Network

CONCLUSION :
Because information security is not solely a technical endeavor,a wide range of
background and skills will be needed is an effective national information security workforce .

You might also like