IT Security
IT Security
MBA – IT Management
• Security
• Information Security
• Threat
• Exposure
• Vulnerability
2
Introduction to Information Security
• Five Factors Contributing to Vulnerability
• Today’s interconnected, interdependent, wirelessly
networked business environment
• Social Engineering
4
5
Human Errors (1 of 3)
• Higher level employees + greater access privileges = greater
threat
8
Social Engineering
• Example:
• Kevin Mitnick, world famous hacker and former
FBI’s most wanted.
Copyright ©2018 John Wiley & Sons, Inc. 9
Deliberate Threats to Information Systems (1
of 2)
• Espionage or Trespass
• Information Extortion
• Sabotage or Vandalism
• Theft of Equipment or Information
10
• Identity Theft
Deliberate Threats to Information Systems (2
of 2)
• Software Attacks
• Alien Software
12
Software Attacks (1 of 3)
13
Software Attacks (2 of 3)
• Remote Attacks Needing No User Action
14
Software Attacks (3 of 3)
• Trojan Horse
• Back Door
• Logic Bomb
• Ransomware
15
Alien Software
• Adware
• Spyware
• Keyloggers
• Spamware
• Cookies
• Tracking cookies
16
• The Cyberattack on Ukraine
17
What Organizations Are Doing to
Protect Information Resources
• Risk
• Risk Analysis
• Risk Mitigation
18
Risk Mitigation
• Risk Acceptance
• Risk Limitation
• Risk Transference
19
Information Security Controls
• Physical Controls
• Access Controls
• Communication Controls
• Business Continuity Planning
• Information Systems Auditing
20
Physical Controls
• Authentication
• Authorization
24
Basic Guidelines for Passwords
• difficult to guess.
• long rather than short.
• They should have uppercase letters, lowercase letters, numbers, and
special characters.
• Firewalls
• Anti-malware Systems
• Whitelisting and Blacklisting
• Encryption
• Virtual Private Networking
• Transport Layer Security (TLS)
• Employee Monitoring Systems 26
27
28
FIGURE 4.5 How digital certificates work.
29
FIGURE 4.6 Virtual private network (VPN) and tunneling.
30
Business Continuity Plan
• Disaster Recovery Plan
• Hot Site
• Warm Site
• Cold Site
32