Goals of Information Security
Major goals of information security:
Major goals of information security
Laws passed by U.S. Congress setting standards for protecting privacy
CIA triad
foundational concepts of information systems security
Risks to Information Systems
Risks to Hardware
The #1 cause of system downtime
hardware failure
Major causes of hardware damage
Blackout
total loss of electricity
brownout
partial loss of electricity
UPS
Uninterruptible power suply
- backup power for a short time
Risks to Data and Applications
keylogging
software records individual keystrokes
Social engineering
con artists pretend to be service people, and ask for passwords
Identity theft
pretending to be another person
Cyber terrorism
Hacking
unauthorized access
Honeytoken
a bogus record in a networked database used to combat hackers
Phishing
bogus messages direct users to a site to “update” personal data
Spear phishing
personal information sued to attack organizational systems, particularly financial institutions
Honeypot
a server containing a mirrored copy of a database or a bogus database
- Educates security officers about vulnerable points
Virus
spreads from computer to computer
Worm
spreads in a network without human intervention
Antivirus software
protects against viruses