Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
227 views26 pages

Threats To Information System

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 26

Threats to Information System

➢ Information System threats refers to all types of danger associated with the
maintenance of information in digital platforms.
➢ Threat can be anything that can take advantage of a vulnerability to breach security
and negatively alter, erase, harm object or objects of interest.

➢ These threats can be many like Software attacks, theft of intellectual property,
identity theft, theft of equipment or information, sabotage, and information
extortion.
➢ Software attacks means attack by Viruses, Worms, Trojan Horses, bots etc.

➢ Many users believe that malware, virus, worms, bots are all same things. But they are
not same, only similarity is that they all are malicious software that behave
differently.
Types of Treats
➢ Theft of intellectual property means violation of intellectual property
rights like copyrights, patents etc.
➢ Identity theft means to act someone else to obtain person’s personal
information or to access vital information and accessing the computer or
social media account of a person by login into the account by using their
login credentials they have theft.
➢ Theft of equipment and information is increasing these days due to the
mobile nature of devices and increasing information capacity.
➢ Sabotage means destroying company’s website to cause loss of confidence
on part of its customer.
➢ Information extortion means theft or make inaccessible or encrypt of
company’s property or information to receive payment in exchange.
Modern Trends of Threats
Technology with weak security – With the advancement in technology, with
every passing day a new gadget is being released in the market. But very few
are fully secured and follows Information Security principles. This leads to theft
of data/ information from the devices

Social media attacks – This cyber criminal identify and infect a cluster of
websites that persons of a particular organisation visit, to steal information.

Mobile Malware –There is a saying when there is a connectivity to Internet


there will be danger to Security. Same goes to Mobile phones where gaming
applications are designed to lure customer to download the game and
unintentionally they will install malware or virus in the device.
Modern Trends of Threats
Outdated Security Software – With new threats emerging everyday, updation
in security software is a pre requisite to have a fully secured environment.

Corporate data on personal devices – These days every organization follows a


rule BYOD. BYOD means Bring your own device like Laptops, Tablets to the
workplace. Clearly BYOD pose a serious threat to security of data but due to
productivity issues organizations are arguing to adopt this.

Social Engineering (Vandalism) – is the art of manipulating people so that they


give up their confidential information like bank account details, password etc.
These criminals can trick you into giving your private and confidential
information or they will gain your trust to get access to your computer to
install a malicious software that will give them control of your computer.
Malware
➢ Malware is a combination of two terms – Malicious and Software.
➢ So Malware basically means malicious software that can be an intrusive
program code or a anything that is designed to perform malicious
operations on system.

➢ Malware can be divided in two categories:


1. Infection Methods
2. Malware Actions
Different types of Malwares on the basis of Infection Method

Virus

➢ They have the ability to replicate


themselves by attaching to the program on
the host computer like songs, videos etc
and then they travel all over the Internet.

➢ Creeper Virus was first detected on


ARPANET(Advanced Research Projects This Message was display in the
Agency Network). terminal screen of the infected
computer.

➢ Examples include File Virus, Macro Virus,


Boot Sector Virus, Stealth Virus etc.
Different types of Malwares on the basis of Infection Method
Worms
➢ Worms are also self replicating in nature but
they don’t attach themselves to the
program on host computer.
➢ Biggest difference between virus and worms
is that worms are network aware.
➢ They can easily travel from one computer to
another if network is available and on the
target machine they will not do much harm,
they will for example consume hard disk
space thus slowing down the computer.
Different types of Malwares on the basis of Infection Method

Trojan
➢ The concept of Trojan is completely
different from the viruses and worms.
The name Trojan derived from the
‘Trojan Horse’ tale in Greek mythology.

➢ Their purpose is to conceal themselves


inside the software that seem
legitimate and when that software is
executed they will do their task of
either stealing information or any other
purpose for which they are designed.
Different types of Malwares on the basis of Infection Method

Trojan
➢ They often provide backdoor gateway
for malicious programs or malevolent
users to enter your system and steal
your valuable data without your
knowledge and permission.

➢ Examples include FTP Trojans, Proxy


Trojans, Remote Access Trojans etc.
Different types of Malwares on the basis of Infection Method
Bots
➢ It can be seen as advanced form
of worms.

➢ They are automated processes


that are designed to interact over
the internet without the need of
human interaction.

➢ They can be good or bad.

➢ Malicious bot can infect one host


and after infecting will create
connection to the central server
which will provide commands to
all infected hosts attached to that
network called Botnet.
Different types of Malwares on the basis of Actions
Adware
➢Adware is not exactly malicious but they do breach privacy of the users.
➢They display ads on computer’s desktop or inside individual programs.
➢They come attached with free to use software, thus main source of
revenue for such developers.
➢They monitor your interests and display relevant ads.
➢An attacker can embed malicious code inside the software and adware
can monitor your system activities and can even compromise your
machine.
Different types of Malwares on the basis of Actions
Adware Example
Different types of Malwares on the basis of Actions
Spyware
➢ It is a program or we can say a software that monitors your
activities on computer and reveal collected information to
interested party.
➢ Spyware are generally dropped by Trojans, viruses or
worms. Once dropped they installs themselves and sits
silently to avoid detection.
➢ One of the most common example of spyware is
KEYLOGGER. The basic job of keylogger is to record user
keystrokes with timestamp. Thus capturing interesting
information like username, passwords, credit card details
etc.
Different types of Malwares on the basis of Actions
Ransomware
It is type of malware that will either encrypt your files or will lock your
computer making it inaccessible either partially or wholly. Then a
screen will be displayed asking for money i.e. ransom in exchange.
Different types of Malwares on the basis of Actions
Scareware
It masquerades as a tool to help fix your system but when the software is
executed it will infect your system or completely destroy it.
The software will display a message to frighten you and force to take some
action like pay them to fix your system.
Different types of Malwares on the basis of Actions
Scareware
Scareware often takes the form of a fake virus alert or system message.
These fake windows are extremely convincing, and will trick even a
seasoned computer user.
Different types of Malwares on the basis of Actions
Rootkits
They are designed to gain root access or we can say administrative privileges in
the user system. Once gained the root access, the exploiter can do anything from
stealing private files to private data.
Different types of Malwares on the basis of Actions
Zombies
They work similar to Spyware. They don’t spy and steal information rather
they wait for the command from hackers.
Information System Risk Management
Control measures of handle an Information System
Security Threats
➢Keeping systems up to date by applying the latest patches to computers,
servers, and hardware. These patches often contain essential security
updates that plug known vulnerabilities.

➢Establishing a process for the backup and recovery of essential data. With
this in place, a business can recover from ransomware threats and
destruction caused by insider threats without expensive cleanup costs.
Information System Risk Management
Control measures of handle an Information System
Security Threats
➢Identity and access management solutions that restrict users from accessing
data that they do not need to see. Working off the principle of least privilege,
the right Identity Access Method solution will help contain data breaches and
insider threats.
➢Properly configured security controls that alert system authorities to possible
attacks and help handle them. These include firewalls, anti-malware
applications, intrusion detection and prevention solutions, and email
security solutions.
Information System Risk Management
Control measures of handle an Information System
Security Threats

➢Relying on multiple vendors to support your security efforts. By not


relying on a single vendor, you are able to work with products and
solutions that focus on specific needs from experts rather than a vendor
that is a jack of all trades but master of none.
Firewall
➢ A firewall is a network security device,
either hardware or software-based,
which monitors all incoming and
outgoing traffic and based on a defined
set of security rules it accepts, rejects
or drops that specific traffic.

➢ A firewall establishes a barrier between


secured internal networks and outside
untrusted network, such as the
Internet.
Firewall

➢ Network Firewalls are frequently used


to prevent unauthorized Internet users
from accessing private networks
connected to the Internet, especially
intranets. All messages entering or
leaving the intranet pass through the
firewall, which examines each message
and blocks those that do not meet the
specified security criteria.
Firewall
Hardware and Software Firewalls
Hardware firewalls are typically found in
broadband routers. They mostly have a
minimum of four network ports to connect
other computers, but for larger networks, a
business networking firewall solution is
available.

Software firewalls are installed on your


computer, like any software program, and you
can customize it; allowing you some control
over its function and protection features for
your computer.
Firewall

➢ Firewalls may also be a component of


computer's operating system. For
example, Windows Firewall is a
Microsoft Windows application that
notifies users of any suspicious
activity. The app can detect and block
viruses, worms, and hackers from
harmful activity.
Firewall
Three Actions of Firewall based on
Security Rule
Accept : allow the traffic

Reject : block the traffic but reply with


an “unreachable error”

Drop : block the traffic with no reply

Firewall match the network traffic against the rule set defined in its table. Once the rule is
matched, associate action is applied to the network traffic.

You might also like