Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

ASSIGNMENT 02

Student I.D : 2217139

Subject : Information Secutrity


Professor : Grace C Kenedy
Lecture : 02

Email : nrsium@gmail.com
Every Organization, Industry, Academical institution, Database, Portal, IT Farm even every person needs
Security. Through learning Information security, we can easily secure our Life. In Business we need security
first.

Need Security in Business : Company core business integrity and client protections are critical, and
the value and importance of information security in organizations make this a priority. All
organizations need protection against cyber attacks and security threats, and investing in those
protections is important. Data breaches are time-consuming, expensive, and bad for business.
With strong infosec, a company reduces their risk of internal and external attacks on information
technology systems. They also protect sensitive data, protect systems from cyber attacks, ensure
business continuity, and provide all stakeholders peace of mind by keeping confidential
information safe from security threats.

Protecting the Functionality of an :

 OrganizationSecure your organisation with strong passwords and enable two-factor authentication
 Educate your teams on phishing to help prevent cyber attacks
 et your business Cyber Essentials Certified
 Always update and get your patch management in order
 Backup your data to avoid business downtime

Protecting Data That Organizations Collect and Use : We can protect our Organization’s through

1. Implement a data security plan.


2. Encrypt data.
3. Communicate data securely.
4. Use access controls and firewalls.
5. Use external service providers carefully.
6. Keep some data off the network.

Safeguarding Technology Assets in Organizations :


Operations Technology (OT) is increasingly being targeted by cyber attacks.

In recent years, high-profile cyber incidents at Stuxnet and Norsk Hydro caused tens of millions of dollars in

damages and destroyed critical equipment.

The Industrial Internet of Things (IIoT) has removed the “air-gap” that once existed between OT assets and

broader IT networks—making OT more vulnerable to cyber threat


Cybersecurity threats faced by OT include direct internet connections, insecure passwords, misconfigured

access points, outdated operating systems, and poor employee training.


OT-heavy organizations should carefully audit third-parties who want access to their systems and take steps

to combat cyber espionage (especially in the mining and energy sectors). Be wary of phishing attacks as well.

Managed cybersecurity services can provide vital protection for an organization’s OT, especially when

combined with best practices like network mapping, a zero-trust framework, and controls for identity and

access management.

Threats :

• Threat: a potential risk to an asset’s loss of value


• Overall security is improving, so is the number of
potential hackers.
• The 2010–2011 CSI/FBI survey found
– 67.1 percent of organizations had malware
infections.
– 11 percent indicated system penetration by an
outsider.

Categories of Threats to Information :Information Security threats can be many like Software attacks, theft
of intellectual property, identity theft, theft of equipment or information, sabotage, and information
extortion. Threat can be anything that can take advantage of a vulnerability to breach security and
negatively alter, erase, harm object or objects of interest. Software attacks means attack by Viruses,
Worms, Trojan Horses etc. Many users believe that malware, virus, worms, bots are all same things. But
they are not same, only similarity is that they all are malicious software that behaves
differently. Malware is a combination of 2 terms- Malicious and Software. So Malware basically means
malicious software that can be an intrusive program code or anything that is designed to perform
malicious operations on system. Malware can be divided in 2 categories:
1. Infection Methods
2. Malware Actions

Compromises to Intellectual Property : The threat of compromises to intellectual property involves


the unauthorized use, duplication, and distribution of protected IP. You may have seen the FBI warning
against piracy of IP. For example, piracy being the unauthorized reproduction or distribution of a
copyrighted work or other IP.

Deviations in Quality of Service :


• Includes situations where products or services are not delivered as expected
• Information system depends on many interdependent support systems
• Internet service, communications, and power irregularities dramatically affect availability of information
and systems.
Espionage or Trespass : Espionage or trespass occurs when an unauthorized individual attempts to gain illegal
access to organizational information. It is important to distinguish between competitive intelligence and
industrial espionage. Competitive intelligence consists of legal information-gathering techniques, such as
studying a company’s Web site and press releases, attending trade shows, and so on. In contrast, industrial
espionage crosses the legal boundary.

Human Error or Failure : Includes acts performed without malicious intent or in ignorance
• Causes include:
– Inexperience
– Improper training
– Incorrect assumptions

Social Engineering : Social engineering is the term used for a broad range of malicious activities accomplished
through human interactions. It uses psychological manipulation to trick users into making security mistakes or
giving away sensitive information. Social engineering attacks happen in one or more steps.

Sabotage or Vandalism :

Vandalism : Vandalism is the action involving deliberate destruction of or damage to public or private
property.The term includes property damage, such as graffiti and defacement directed towards any property
without permission of the owner. The term finds its roots in an Enlightenment view that the
Germanic Vandals were a uniquely destructive people.

Software Attacks : Many software threats now target smartphones specifically, so approaches to cybersecurity
that are based on desktop computers are not always effective. While viruses that target smartphones are
simply the mobile versions of ones that target your desktop or laptop computer, man-in-the-middle attacks
take advantage of free Wi-Fi in order to place hackers between your device and a Wi-Fi hotspot and steal your
information and details from your apps. Bluejacking is the sending of unwanted or unsolicited messages to
strangers via Bluetooth technology. It can be a serious problem if obscene or threatening messages and
images are sent. Bluesnarfing is the actual theft of data from Bluetooth enabled devices (including both
mobile phones and laptops): contact lists, phonebooks, images and other data may be stolen in this way.
Mobile Ransomware is malware that locks up your device. If your device has been infected with the malware,
you lose all access to every part of your phone until you pay a ransom to the hacker/criminal who has taken
control over your device. Phishing or Smishing usually starts as an email or text claiming to be from a person
or business that you know. This email usually contains a link that asks you to verify information. This
information in turn goes straight to the scammer to steal and use your details.

Denial-of-Service Attack : A Denial-of-Service (DoS) attack is an attack meant to shut down a machine
or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the
target with traffic, or sending it information that triggers a crash.

IP Spoofing Attack : IP Spoofing is essentially a technique used by a hackers to gain unauthorized


access to Computers. Concepts of IP Spoofing was initially discussed in academic circles as early as
1980. IP Spoofing types of attacks, had been known to Security expert on the theoretical level. It was
primarily theoretical until Robert Morris discovered a security weakness in the TCP protocol known
as sequence prediction. Occasionally IP spoofing is done to mask the origins of a Dos attack. In
fact Dos attacks often mask actual IP address from where attack has originated from.
Man-in-Middle Attack : A man in the middle (MITM) attack is a general term for when a perpetrator
positions himself in a conversation between a user and an application—either to eavesdrop or to
impersonate one of the parties, making it appear as if a normal exchange of information is
underway.The goal of an attack is to steal personal information, such as login credentials, account
details and credit card numbers. Targets are typically the users of financial applications, SaaS
businesses, e-commerce sites and other websites where logging in is required.Information obtained
during an attack could be used for many purposes, including identity theft, unapproved fund transfers
or an illicit password change.Additionally, it can be used to gain a foothold inside a secured perimeter
during the infiltration stage of an advanced persistent threat (APT) assault.

Theft : Theft, also known as information theft – is the illegal transfer or storage of personal,
confidential, or financial information. This could include passwords, software code or algorithms, and
proprietary processes or technologies. Data theft is considered a serious security and privacy breach,
with potentially severe consequences for individuals and organizations.

You might also like