SlideShare a Scribd company logo
1
Information Security
Lecture # 2
Dr. Shafiq Hussain
Associate Professor & Chairperson
Department of Computer Science
2
Objectives
• Introduction to Information security
3
Issues of Information Security
• Cyber threats: The increasing sophistication of
cyber attacks, including malware, phishing, and
ransomware, makes it difficult to protect information
systems and the information they store.
4
Issues of Information Security (Cont..)
• Human error: People can inadvertently put
information at risk through actions such as losing
laptops or smartphones, clicking on malicious links,
or using weak passwords.
5
Issues of Information Security (Cont..)
• Insider threats: Employees with access to sensitive
information can pose a risk if they intentionally or
unintentionally cause harm to the organization.
6
Issues of Information Security (Cont..)
• Legacy systems: Older information systems may not
have the security features of newer systems, making
them more vulnerable to attack.
7
Issues of Information Security (Cont..)
• Complexity: The increasing complexity of
information systems and the information they store
makes it difficult to secure them effectively.
8
Issues of Information Security (Cont..)
• Mobile and IoT devices: The growing number of
mobile devices and internet of things (IoT) devices
creates new security challenges as they can be easily
lost or stolen, and may have weak security controls.
9
Issues of Information Security (Cont..)
• Integration with third-party systems: Integrating
information systems with third-party systems can
introduce new security risks, as the third-party
systems may have security vulnerabilities..
10
Issues of Information Security (Cont..)
• Data privacy: Protecting personal and sensitive
information from unauthorized access, use, or
disclosure is becoming increasingly important as data
privacy regulations become more strict.
11
Issues of Information Security (Cont..)
• Globalization: The increasing globalization of
business makes it more difficult to secure
information, as data may be stored, processed, and
transmitted across multiple countries with different
security requirements.
12
Important Concepts in Information
Security
Vulnerability
• Vulnerability is a weakness which allows an attacker
to reduce a system's information assurance.
• Vulnerability is the intersection of three elements: a
system susceptibility or flaw, attacker access to the
flaw, and attacker capability to exploit the flaw.
13
Important Concepts in Information
Security (Cont..)
Vulnerability
• To exploit vulnerability, an attacker must have at least
one applicable tool or technique that can connect to a
system weakness.
• In this frame, vulnerability is also known as the attack
surface.
14
Important Concepts in Information
Security (Cont..)
Vulnerability
• Vulnerability management is the cyclical practice of
identifying, classifying, remediating, and mitigating
vulnerabilities.
• This practice generally refers to software
vulnerabilities in computing systems.
15
Important Concepts in Information
Security (Cont..)
Backdoors
• A backdoor in a computer system, is a method of
bypassing normal authentication, securing remote
access to a computer, obtaining access to plaintext,
and so on, while attempting to remain undetected.
16
Important Concepts in Information
Security (Cont..)
Backdoors
• The backdoor may take the form of an installed
program or could be a modification to an existing
program or hardware device.
• It may also do fake information about disk and
memory usage.
17
Important Concepts in Information
Security (Cont..)
Denial-of-service attack
• Unlike other exploits, denials of service attacks are
not used to gain unauthorized access or control of a
system.
• They are instead designed to render it unusable.
18
Important Concepts in Information
Security (Cont..)
Denial-of-service attack
• Attackers can deny service to individual victims, such
as by deliberately entering a wrong password enough
consecutive times to cause the victim account to be
locked, or they may overload the capabilities of a
machine or network and block all users at once.
19
Important Concepts in Information
Security (Cont..)
Denial-of-service attack
• These types of attack are, in practice, very hard to
prevent, because the behaviour of whole networks
needs to be analyzed, not only the behaviour of small
pieces of code.
20
Important Concepts in Information
Security (Cont..)
Denial-of-service attack
• Distributed denial of service (DDoS) attacks are
common, where a large number of compromised
hosts are used to flood a target system with network
requests, thus attempting to render it unusable
through resource exhaustion.
21
Important Concepts in Information
Security (Cont..)
Direct-access attacks
• An unauthorized user gaining physical access to a
computer (or part thereof) can perform many
functions, install different types of devices to
compromise security, including operating system
modifications, software worms, key loggers, and
covert listening devices.
22
Important Concepts in Information
Security (Cont..)
Direct-access attacks
• The attacker can also easily download large quantities
of data onto backup media, for instance CD-R/DVD-
R, tape; or portable devices such as key drives, digital
cameras or digital audio players.
23
Important Concepts in Information
Security (Cont..)
Direct-access attacks
• Another common technique is to boot an operating
system contained on a CD-ROM or other bootable
media and read the data from the hard drive(s) this
way.
24
Important Concepts in Information
Security (Cont..)
Direct-access attacks
• The only way to defeat this is to encrypt the storage
media and store the key separate from the system.
• Direct-access attacks are the only type of threat to
Standalone computers (never connect to internet), in
most cases.
25
Important Concepts in Information
Security (Cont..)
Eavesdropping
• Eavesdropping is the act of listening to a private
conversation, typically between hosts on a network.
• For instance, programs such as Carnivore and
NarusInsight have been used by the FBI and NSA to
eavesdrop on the systems of internet service
providers.
26
Important Concepts in Information
Security (Cont..)
Spoofing
• Spoofing of user identity describes a situation in
which one person or program successfully
masquerades as another by falsifying data and
thereby gaining an illegitimate advantage.
27
Important Concepts in Information
Security (Cont..)
Tampering
• Tampering describes an intentional modification of
products in a way that would make them harmful to
the consumer.
28
Questions
Any Question Please?
You can contact me at: drshafiq@uosahiwal.edu.pk
Your Query will be answered within one working day.
29
Further Readings
• Chapter No. 1
Computer_Security_Principles_and_Practice_(3rd_E
dition)
By William Stallings and Lawrie Brown
30
Thanks

More Related Content

PPT
Information Assurance And Security - Chapter 2 - Lesson 2
PPT
Lecture 01- What is Information Security.ppt
PPTX
Chapter 2 - Lesson 2.pptx
PPTX
chapter1 Introduction to Software Security.pptx
PPTX
Network security
PPTX
Cyber Security: A Hands on review
PPTX
Unit 1.pptx
Information Assurance And Security - Chapter 2 - Lesson 2
Lecture 01- What is Information Security.ppt
Chapter 2 - Lesson 2.pptx
chapter1 Introduction to Software Security.pptx
Network security
Cyber Security: A Hands on review
Unit 1.pptx

Similar to Lecture-2 about programming download.pptx (20)

PPTX
Unit 1 Network Fundamentals and Security .pptx
PPTX
Data Network Security
PPTX
Cloud Security.pptx
PPTX
Cyber Security and Data Privacy in Information Systems.pptx
PDF
funsec_ch02A.pdf
PPT
Isys20261 lecture 02
PPTX
Information Security and Privacy-Unit-1.pptx
PPT
MIS part 4_CH 11.ppt
PPT
DATA SECURITY AND CONTROL.ppt
PPTX
Introduction to cyber security.pptx
PDF
Lecture 01 Information Security BS computer Science
PPTX
3-UnitV_security.pptx
PPTX
Cyber-Security-Unit-1.pptx
PPTX
Cyber Security awareness of cyber security
PPT
Chapter1 intro network_security_sunorganised
PDF
Presentation 10 (1).pdf
PPTX
Computer Security and their social effect and their usage.
PPTX
U-1.pptx..........................................
PDF
Cyber Security
PPTX
1_Introduction to security.pptx
Unit 1 Network Fundamentals and Security .pptx
Data Network Security
Cloud Security.pptx
Cyber Security and Data Privacy in Information Systems.pptx
funsec_ch02A.pdf
Isys20261 lecture 02
Information Security and Privacy-Unit-1.pptx
MIS part 4_CH 11.ppt
DATA SECURITY AND CONTROL.ppt
Introduction to cyber security.pptx
Lecture 01 Information Security BS computer Science
3-UnitV_security.pptx
Cyber-Security-Unit-1.pptx
Cyber Security awareness of cyber security
Chapter1 intro network_security_sunorganised
Presentation 10 (1).pdf
Computer Security and their social effect and their usage.
U-1.pptx..........................................
Cyber Security
1_Introduction to security.pptx
Ad

More from MUHAMMADAHMAD173574 (16)

PPTX
Lecture-45.pptxLecture-33 programming lacture notes.pptx
PPTX
Lecture-33 programming lacture notes.pptx
PPTX
Lecture-39.pptx Xperia of this slide can conversation
PPTX
Lecture also solve this ppy slit for next-14.pptx
PPTX
Lectur can you explain me this slidee-17.pptx
PPTX
Lecture-8. I know this slide is littlepptx
PPTX
Lecture- program are executed in syst9.pptx
PPTX
Lecture-6 about this slide programs .pptx
PPTX
Lecture-10 about language of community.pptx
PPTX
Lecture-1 about programming language.pptx
PDF
MobApp 02- for HTML5 for Mobiles (1).pdf
PPTX
MobApp 01- Mobile Application Development Platform (1).pptx
PDF
Android Programming lecture 1-2 with full character.pdf
PPTX
CN Lecture 7 CN slide for ppt presentation.pptx
PPTX
CN word documentary lec 8 (Ip addressing).pptx
PPTX
CN lacture 6.pptxhsjsbsbsksnsbsbnsjssvsv
Lecture-45.pptxLecture-33 programming lacture notes.pptx
Lecture-33 programming lacture notes.pptx
Lecture-39.pptx Xperia of this slide can conversation
Lecture also solve this ppy slit for next-14.pptx
Lectur can you explain me this slidee-17.pptx
Lecture-8. I know this slide is littlepptx
Lecture- program are executed in syst9.pptx
Lecture-6 about this slide programs .pptx
Lecture-10 about language of community.pptx
Lecture-1 about programming language.pptx
MobApp 02- for HTML5 for Mobiles (1).pdf
MobApp 01- Mobile Application Development Platform (1).pptx
Android Programming lecture 1-2 with full character.pdf
CN Lecture 7 CN slide for ppt presentation.pptx
CN word documentary lec 8 (Ip addressing).pptx
CN lacture 6.pptxhsjsbsbsksnsbsbnsjssvsv
Ad

Recently uploaded (20)

PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
web development for engineering and engineering
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Geodesy 1.pptx...............................................
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Well-logging-methods_new................
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
web development for engineering and engineering
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Foundation to blockchain - A guide to Blockchain Tech
Geodesy 1.pptx...............................................
Structs to JSON How Go Powers REST APIs.pdf
Internet of Things (IOT) - A guide to understanding
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Well-logging-methods_new................
UNIT 4 Total Quality Management .pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
CH1 Production IntroductoryConcepts.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx

Lecture-2 about programming download.pptx

  • 1. 1 Information Security Lecture # 2 Dr. Shafiq Hussain Associate Professor & Chairperson Department of Computer Science
  • 2. 2 Objectives • Introduction to Information security
  • 3. 3 Issues of Information Security • Cyber threats: The increasing sophistication of cyber attacks, including malware, phishing, and ransomware, makes it difficult to protect information systems and the information they store.
  • 4. 4 Issues of Information Security (Cont..) • Human error: People can inadvertently put information at risk through actions such as losing laptops or smartphones, clicking on malicious links, or using weak passwords.
  • 5. 5 Issues of Information Security (Cont..) • Insider threats: Employees with access to sensitive information can pose a risk if they intentionally or unintentionally cause harm to the organization.
  • 6. 6 Issues of Information Security (Cont..) • Legacy systems: Older information systems may not have the security features of newer systems, making them more vulnerable to attack.
  • 7. 7 Issues of Information Security (Cont..) • Complexity: The increasing complexity of information systems and the information they store makes it difficult to secure them effectively.
  • 8. 8 Issues of Information Security (Cont..) • Mobile and IoT devices: The growing number of mobile devices and internet of things (IoT) devices creates new security challenges as they can be easily lost or stolen, and may have weak security controls.
  • 9. 9 Issues of Information Security (Cont..) • Integration with third-party systems: Integrating information systems with third-party systems can introduce new security risks, as the third-party systems may have security vulnerabilities..
  • 10. 10 Issues of Information Security (Cont..) • Data privacy: Protecting personal and sensitive information from unauthorized access, use, or disclosure is becoming increasingly important as data privacy regulations become more strict.
  • 11. 11 Issues of Information Security (Cont..) • Globalization: The increasing globalization of business makes it more difficult to secure information, as data may be stored, processed, and transmitted across multiple countries with different security requirements.
  • 12. 12 Important Concepts in Information Security Vulnerability • Vulnerability is a weakness which allows an attacker to reduce a system's information assurance. • Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw.
  • 13. 13 Important Concepts in Information Security (Cont..) Vulnerability • To exploit vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. • In this frame, vulnerability is also known as the attack surface.
  • 14. 14 Important Concepts in Information Security (Cont..) Vulnerability • Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. • This practice generally refers to software vulnerabilities in computing systems.
  • 15. 15 Important Concepts in Information Security (Cont..) Backdoors • A backdoor in a computer system, is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.
  • 16. 16 Important Concepts in Information Security (Cont..) Backdoors • The backdoor may take the form of an installed program or could be a modification to an existing program or hardware device. • It may also do fake information about disk and memory usage.
  • 17. 17 Important Concepts in Information Security (Cont..) Denial-of-service attack • Unlike other exploits, denials of service attacks are not used to gain unauthorized access or control of a system. • They are instead designed to render it unusable.
  • 18. 18 Important Concepts in Information Security (Cont..) Denial-of-service attack • Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of a machine or network and block all users at once.
  • 19. 19 Important Concepts in Information Security (Cont..) Denial-of-service attack • These types of attack are, in practice, very hard to prevent, because the behaviour of whole networks needs to be analyzed, not only the behaviour of small pieces of code.
  • 20. 20 Important Concepts in Information Security (Cont..) Denial-of-service attack • Distributed denial of service (DDoS) attacks are common, where a large number of compromised hosts are used to flood a target system with network requests, thus attempting to render it unusable through resource exhaustion.
  • 21. 21 Important Concepts in Information Security (Cont..) Direct-access attacks • An unauthorized user gaining physical access to a computer (or part thereof) can perform many functions, install different types of devices to compromise security, including operating system modifications, software worms, key loggers, and covert listening devices.
  • 22. 22 Important Concepts in Information Security (Cont..) Direct-access attacks • The attacker can also easily download large quantities of data onto backup media, for instance CD-R/DVD- R, tape; or portable devices such as key drives, digital cameras or digital audio players.
  • 23. 23 Important Concepts in Information Security (Cont..) Direct-access attacks • Another common technique is to boot an operating system contained on a CD-ROM or other bootable media and read the data from the hard drive(s) this way.
  • 24. 24 Important Concepts in Information Security (Cont..) Direct-access attacks • The only way to defeat this is to encrypt the storage media and store the key separate from the system. • Direct-access attacks are the only type of threat to Standalone computers (never connect to internet), in most cases.
  • 25. 25 Important Concepts in Information Security (Cont..) Eavesdropping • Eavesdropping is the act of listening to a private conversation, typically between hosts on a network. • For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers.
  • 26. 26 Important Concepts in Information Security (Cont..) Spoofing • Spoofing of user identity describes a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
  • 27. 27 Important Concepts in Information Security (Cont..) Tampering • Tampering describes an intentional modification of products in a way that would make them harmful to the consumer.
  • 28. 28 Questions Any Question Please? You can contact me at: drshafiq@uosahiwal.edu.pk Your Query will be answered within one working day.
  • 29. 29 Further Readings • Chapter No. 1 Computer_Security_Principles_and_Practice_(3rd_E dition) By William Stallings and Lawrie Brown