SlideShare a Scribd company logo
Principles of Information Security,
Fifth Edition
Chapter 2
The Need for Security
Lesson 2 – Threats
Learning Objectives
• Upon completion of this material, you should be
able to:
– Explain why a successful information security program is
the shared responsibility of an organization’s general
management and IT management
– List and describe the threats posed to information
security
Principles of Information Security, Fifth Edition 2
Threats
• Threat: a potential risk to an asset’s loss of value
• Management must be informed about the various
threats to an organization’s people, applications,
data, and information systems.
• Overall security is improving, so is the number of
potential hackers.
• The 2010–2011 CSI/FBI survey found
– 67.1 percent of organizations had malware
infections.
– 11 percent indicated system penetration by an
outsider.
Principles of Information Security, Fifth Edition 3
Principles of Information Security, Fifth Edition 4
Principles of Information Security, Fifth Edition 5
Principles of Information Security, Fifth Edition 6
Compromises to Intellectual Property
• Intellectual property (IP): creation, ownership, and
control of original ideas as well as the
representation of those ideas
• The most common IP breaches involve software
piracy.
• Two watchdog organizations investigate software
abuse:
– Software & Information Industry Association (SIIA)
– Business Software Alliance (BSA)
• Enforcement of copyright law has been attempted
with technical security mechanisms.
Principles of Information Security, Fifth Edition 7
Deviations in Quality of Service
• Information system depends on the successful
operation of many interdependent support systems.
• Internet service, communications, and power
irregularities dramatically affect the availability of
information and systems.
Principles of Information Security, Fifth Edition 8
Deviations in Quality of Service
(cont’d)
• Internet service issues
– Internet service provider (ISP) failures can considerably
undermine the availability of information.
– Outsourced Web hosting provider assumes
responsibility for all Internet services as well as for the
hardware and Web site operating system software.
• Communications and other service provider issues
– Other utility services affect organizations: telephone,
water, wastewater, trash pickup.
– Loss of these services can affect organization’s ability
to function.
Principles of Information Security, Fifth Edition 9
Principles of Information Security, Fifth Edition 10
Deviations in Quality of Service
(cont’d)
• Power irregularities
– Commonplace
– Lead to fluctuations such as power excesses, power
shortages, and power losses
– Sensitive electronic equipment vulnerable to and
easily damaged/destroyed by fluctuations
– Controls can be applied to manage power quality.
Principles of Information Security, Fifth Edition 11
Espionage or Trespass
• Access of protected information by unauthorized
individuals
• Competitive intelligence (legal) versus industrial
espionage (illegal)
• Shoulder surfing can occur anywhere a person
accesses confidential information.
• Controls let trespassers know they are encroaching
on organization’s cyberspace.
• Hackers use skill, guile, or fraud to bypass controls
protecting others’ information.
Principles of Information Security, Fifth Edition 12
Principles of Information Security, Fifth Edition 13
Espionage or Trespass (cont’d)
• Expert hacker
– Develops software scripts and program exploits
– Usually a master of many skills
– Will often create attack software and share with
others
• Unskilled hacker
– Many more unskilled hackers than expert hackers
– Use expertly written software to exploit a system
– Do not usually fully understand the systems they
hack
Principles of Information Security, Fifth Edition 14
Principles of Information Security, Fifth Edition 15
Espionage or Trespass (cont’d)
• Other terms for system rule breakers:
– Cracker: “cracks” or removes software protection
designed to prevent unauthorized duplication
– Phreaker: hacks the public telephone system to
make free calls or disrupt services
• Password attacks
– Cracking
– Brute force
– Dictionary
– Rainbow tables
– Social engineering
Principles of Information Security, Fifth Edition 16
Principles of Information Security, Fifth Edition 17
Forces of Nature
• Forces of nature can present some of the most
dangerous threats.
• They disrupt not only individual lives, but also
storage, transmission, and use of information.
• Organizations must implement controls to limit
damage and prepare contingency plans for
continued operations.
Principles of Information Security, Fifth Edition 18
Human Error or Failure
• Includes acts performed without malicious intent or
in ignorance
• Causes include:
– Inexperience
– Improper training
– Incorrect assumptions
• Employees are among the greatest threats to an
organization’s data.
Principles of Information Security, Fifth Edition 19
Principles of Information Security, Fifth Edition 20
Human Error or Failure (cont’d)
• Employee mistakes can easily lead to:
– Revelation of classified data
– Entry of erroneous data
– Accidental data deletion or modification
– Data storage in unprotected areas
– Failure to protect information
• Many of these threats can be prevented with
training, ongoing awareness activities, and
controls.
• Social engineering uses social skills to convince
people to reveal access credentials or other
valuable information to an attacker.
Principles of Information Security, Fifth Edition 21
Social Engineering
• “People are the weakest link. You can have the best
technology; firewalls, intrusion-detection systems,
biometric devices ... and somebody can call an
unsuspecting employee. That's all she wrote, baby.
They got everything.”—Kevin Mitnick
• Advance-fee fraud: indicates recipient is due money
and small advance fee/personal banking information
required to facilitate transfer
• Phishing: attempt to gain personal/confidential
information; apparent legitimate communication hides
embedded code that redirects user to third-party site
Principles of Information Security, Fifth Edition 22
Principles of Information Security, Fifth Edition 23
Information Extortion
• Attacker steals information from a computer system
and demands compensation for its return or
nondisclosure. Also known as cyberextortion.
• Commonly done in credit card number theft
Principles of Information Security, Fifth Edition 24
Sabotage or Vandalism
• Threats can range from petty vandalism to
organized sabotage.
• Web site defacing can erode consumer confidence,
diminishing organization’s sales, net worth, and
reputation.
• Threat of hacktivist or cyberactivist operations is
rising.
• Cyberterrorism/Cyberwarfare: a much more sinister
form of hacking
Principles of Information Security, Fifth Edition 25
Principles of Information Security, Fifth Edition 26

More Related Content

PPTX
Information security threats
PPTX
Information security
PPT
Introduction To OWASP
PPT
Cyber security vs information assurance
PPTX
PPT-Security-for-Management.pptx
PDF
SIEM Architecture
PPT
Information Assurance And Security - Chapter 2 - Lesson 2
PPTX
Security operation center (SOC)
Information security threats
Information security
Introduction To OWASP
Cyber security vs information assurance
PPT-Security-for-Management.pptx
SIEM Architecture
Information Assurance And Security - Chapter 2 - Lesson 2
Security operation center (SOC)

What's hot (20)

PPTX
cyber security
PDF
Defense In Depth Using NIST 800-30
PPTX
ISA/IEC 62443: Intro and How To
PPTX
Owasp top 10 vulnerabilities
PPT
information security management
PPSX
Web security
PDF
penetration test using Kali linux ppt
PPTX
Tools and Methods for Effective Reconnaissance: A Comprehensive Report
PPTX
Security Information Event Management - nullhyd
PPT
Information security
PPT
Ethical hacking
PPTX
IT security
PPTX
Zero trust deck 2020
PPT
Information security-management-system
PPTX
SIEM presentation final
PPTX
Security Information and Event Management (SIEM)
PPTX
Security Operation Center Fundamental
PPT
Database Security
PDF
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
PPTX
Database security
cyber security
Defense In Depth Using NIST 800-30
ISA/IEC 62443: Intro and How To
Owasp top 10 vulnerabilities
information security management
Web security
penetration test using Kali linux ppt
Tools and Methods for Effective Reconnaissance: A Comprehensive Report
Security Information Event Management - nullhyd
Information security
Ethical hacking
IT security
Zero trust deck 2020
Information security-management-system
SIEM presentation final
Security Information and Event Management (SIEM)
Security Operation Center Fundamental
Database Security
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Database security
Ad

Similar to Lesson 2 (20)

PPTX
Chapter 2 - Lesson 2.pptx
PPT
ch02_2.ppt
PPT
ch02_2.ppt
PPT
Principles of information security ch02_2.ppt
PPT
ch02_2.ppt principles of information ser.
PPTX
chapter1 Introduction to Software Security.pptx
PPTX
Lecture-2 about programming download.pptx
PPTX
Cloud Security.pptx
PPT
DATA SECURITY AND CONTROL.ppt
PPTX
Lecture 6 Cybersecurity-Basics and .pptx
PPTX
Network security
PDF
Lecture 01 Information Security BS computer Science
PPTX
2014-09-03 Cybersecurity and Computer Crimes
PPTX
2014-09-03 Cybersecurity and Computer Crimes
PPT
MIS part 4_CH 11.ppt
PPTX
Management Information Systems ( Security and Control.pptx
PPT
Information Technology Security Basics
PPTX
Cyber Security Briefing
PPT
Security information for internet and security
PPT
IT-Security-20210426203847.ppt
Chapter 2 - Lesson 2.pptx
ch02_2.ppt
ch02_2.ppt
Principles of information security ch02_2.ppt
ch02_2.ppt principles of information ser.
chapter1 Introduction to Software Security.pptx
Lecture-2 about programming download.pptx
Cloud Security.pptx
DATA SECURITY AND CONTROL.ppt
Lecture 6 Cybersecurity-Basics and .pptx
Network security
Lecture 01 Information Security BS computer Science
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
MIS part 4_CH 11.ppt
Management Information Systems ( Security and Control.pptx
Information Technology Security Basics
Cyber Security Briefing
Security information for internet and security
IT-Security-20210426203847.ppt
Ad

More from MLG College of Learning, Inc (20)

PPTX
PPTX
PC111-lesson1.pptx
PPTX
PC LEESOON 6.pptx
PPTX
PC 106 PPT-09.pptx
PPTX
PPTX
PPTX
PPTX
PC 106 Slide no.02
PPTX
PPTX
PPTX
PC 106 Slide 1.pptx
PDF
Db2 characteristics of db ms
PDF

Recently uploaded (20)

PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Cell Structure & Organelles in detailed.
PDF
Classroom Observation Tools for Teachers
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Cell Types and Its function , kingdom of life
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Insiders guide to clinical Medicine.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
01-Introduction-to-Information-Management.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
RMMM.pdf make it easy to upload and study
Renaissance Architecture: A Journey from Faith to Humanism
Cell Structure & Organelles in detailed.
Classroom Observation Tools for Teachers
VCE English Exam - Section C Student Revision Booklet
Cell Types and Its function , kingdom of life
Week 4 Term 3 Study Techniques revisited.pptx
Insiders guide to clinical Medicine.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Complications of Minimal Access Surgery at WLH
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Microbial diseases, their pathogenesis and prophylaxis
01-Introduction-to-Information-Management.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Abdominal Access Techniques with Prof. Dr. R K Mishra
STATICS OF THE RIGID BODIES Hibbelers.pdf
TR - Agricultural Crops Production NC III.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Microbial disease of the cardiovascular and lymphatic systems
RMMM.pdf make it easy to upload and study

Lesson 2

  • 1. Principles of Information Security, Fifth Edition Chapter 2 The Need for Security Lesson 2 – Threats
  • 2. Learning Objectives • Upon completion of this material, you should be able to: – Explain why a successful information security program is the shared responsibility of an organization’s general management and IT management – List and describe the threats posed to information security Principles of Information Security, Fifth Edition 2
  • 3. Threats • Threat: a potential risk to an asset’s loss of value • Management must be informed about the various threats to an organization’s people, applications, data, and information systems. • Overall security is improving, so is the number of potential hackers. • The 2010–2011 CSI/FBI survey found – 67.1 percent of organizations had malware infections. – 11 percent indicated system penetration by an outsider. Principles of Information Security, Fifth Edition 3
  • 4. Principles of Information Security, Fifth Edition 4
  • 5. Principles of Information Security, Fifth Edition 5
  • 6. Principles of Information Security, Fifth Edition 6
  • 7. Compromises to Intellectual Property • Intellectual property (IP): creation, ownership, and control of original ideas as well as the representation of those ideas • The most common IP breaches involve software piracy. • Two watchdog organizations investigate software abuse: – Software & Information Industry Association (SIIA) – Business Software Alliance (BSA) • Enforcement of copyright law has been attempted with technical security mechanisms. Principles of Information Security, Fifth Edition 7
  • 8. Deviations in Quality of Service • Information system depends on the successful operation of many interdependent support systems. • Internet service, communications, and power irregularities dramatically affect the availability of information and systems. Principles of Information Security, Fifth Edition 8
  • 9. Deviations in Quality of Service (cont’d) • Internet service issues – Internet service provider (ISP) failures can considerably undermine the availability of information. – Outsourced Web hosting provider assumes responsibility for all Internet services as well as for the hardware and Web site operating system software. • Communications and other service provider issues – Other utility services affect organizations: telephone, water, wastewater, trash pickup. – Loss of these services can affect organization’s ability to function. Principles of Information Security, Fifth Edition 9
  • 10. Principles of Information Security, Fifth Edition 10
  • 11. Deviations in Quality of Service (cont’d) • Power irregularities – Commonplace – Lead to fluctuations such as power excesses, power shortages, and power losses – Sensitive electronic equipment vulnerable to and easily damaged/destroyed by fluctuations – Controls can be applied to manage power quality. Principles of Information Security, Fifth Edition 11
  • 12. Espionage or Trespass • Access of protected information by unauthorized individuals • Competitive intelligence (legal) versus industrial espionage (illegal) • Shoulder surfing can occur anywhere a person accesses confidential information. • Controls let trespassers know they are encroaching on organization’s cyberspace. • Hackers use skill, guile, or fraud to bypass controls protecting others’ information. Principles of Information Security, Fifth Edition 12
  • 13. Principles of Information Security, Fifth Edition 13
  • 14. Espionage or Trespass (cont’d) • Expert hacker – Develops software scripts and program exploits – Usually a master of many skills – Will often create attack software and share with others • Unskilled hacker – Many more unskilled hackers than expert hackers – Use expertly written software to exploit a system – Do not usually fully understand the systems they hack Principles of Information Security, Fifth Edition 14
  • 15. Principles of Information Security, Fifth Edition 15
  • 16. Espionage or Trespass (cont’d) • Other terms for system rule breakers: – Cracker: “cracks” or removes software protection designed to prevent unauthorized duplication – Phreaker: hacks the public telephone system to make free calls or disrupt services • Password attacks – Cracking – Brute force – Dictionary – Rainbow tables – Social engineering Principles of Information Security, Fifth Edition 16
  • 17. Principles of Information Security, Fifth Edition 17
  • 18. Forces of Nature • Forces of nature can present some of the most dangerous threats. • They disrupt not only individual lives, but also storage, transmission, and use of information. • Organizations must implement controls to limit damage and prepare contingency plans for continued operations. Principles of Information Security, Fifth Edition 18
  • 19. Human Error or Failure • Includes acts performed without malicious intent or in ignorance • Causes include: – Inexperience – Improper training – Incorrect assumptions • Employees are among the greatest threats to an organization’s data. Principles of Information Security, Fifth Edition 19
  • 20. Principles of Information Security, Fifth Edition 20
  • 21. Human Error or Failure (cont’d) • Employee mistakes can easily lead to: – Revelation of classified data – Entry of erroneous data – Accidental data deletion or modification – Data storage in unprotected areas – Failure to protect information • Many of these threats can be prevented with training, ongoing awareness activities, and controls. • Social engineering uses social skills to convince people to reveal access credentials or other valuable information to an attacker. Principles of Information Security, Fifth Edition 21
  • 22. Social Engineering • “People are the weakest link. You can have the best technology; firewalls, intrusion-detection systems, biometric devices ... and somebody can call an unsuspecting employee. That's all she wrote, baby. They got everything.”—Kevin Mitnick • Advance-fee fraud: indicates recipient is due money and small advance fee/personal banking information required to facilitate transfer • Phishing: attempt to gain personal/confidential information; apparent legitimate communication hides embedded code that redirects user to third-party site Principles of Information Security, Fifth Edition 22
  • 23. Principles of Information Security, Fifth Edition 23
  • 24. Information Extortion • Attacker steals information from a computer system and demands compensation for its return or nondisclosure. Also known as cyberextortion. • Commonly done in credit card number theft Principles of Information Security, Fifth Edition 24
  • 25. Sabotage or Vandalism • Threats can range from petty vandalism to organized sabotage. • Web site defacing can erode consumer confidence, diminishing organization’s sales, net worth, and reputation. • Threat of hacktivist or cyberactivist operations is rising. • Cyberterrorism/Cyberwarfare: a much more sinister form of hacking Principles of Information Security, Fifth Edition 25
  • 26. Principles of Information Security, Fifth Edition 26