Threats To Information System
Threats To Information System
Threats To Information System
➢ Information System threats refers to all types of danger associated with the
maintenance of information in digital platforms.
➢ Threat can be anything that can take advantage of a vulnerability to breach security
and negatively alter, erase, harm object or objects of interest.
➢ These threats can be many like Software attacks, theft of intellectual property,
identity theft, theft of equipment or information, sabotage, and information
extortion.
➢ Software attacks means attack by Viruses, Worms, Trojan Horses, bots etc.
➢ Many users believe that malware, virus, worms, bots are all same things. But they are
not same, only similarity is that they all are malicious software that behave
differently.
Types of Treats
➢ Theft of intellectual property means violation of intellectual property
rights like copyrights, patents etc.
➢ Identity theft means to act someone else to obtain person’s personal
information or to access vital information and accessing the computer or
social media account of a person by login into the account by using their
login credentials they have theft.
➢ Theft of equipment and information is increasing these days due to the
mobile nature of devices and increasing information capacity.
➢ Sabotage means destroying company’s website to cause loss of confidence
on part of its customer.
➢ Information extortion means theft or make inaccessible or encrypt of
company’s property or information to receive payment in exchange.
Modern Trends of Threats
Technology with weak security – With the advancement in technology, with
every passing day a new gadget is being released in the market. But very few
are fully secured and follows Information Security principles. This leads to theft
of data/ information from the devices
Social media attacks – This cyber criminal identify and infect a cluster of
websites that persons of a particular organisation visit, to steal information.
Virus
Trojan
➢ The concept of Trojan is completely
different from the viruses and worms.
The name Trojan derived from the
‘Trojan Horse’ tale in Greek mythology.
Trojan
➢ They often provide backdoor gateway
for malicious programs or malevolent
users to enter your system and steal
your valuable data without your
knowledge and permission.
➢Establishing a process for the backup and recovery of essential data. With
this in place, a business can recover from ransomware threats and
destruction caused by insider threats without expensive cleanup costs.
Information System Risk Management
Control measures of handle an Information System
Security Threats
➢Identity and access management solutions that restrict users from accessing
data that they do not need to see. Working off the principle of least privilege,
the right Identity Access Method solution will help contain data breaches and
insider threats.
➢Properly configured security controls that alert system authorities to possible
attacks and help handle them. These include firewalls, anti-malware
applications, intrusion detection and prevention solutions, and email
security solutions.
Information System Risk Management
Control measures of handle an Information System
Security Threats
Firewall match the network traffic against the rule set defined in its table. Once the rule is
matched, associate action is applied to the network traffic.