Professional Documents
Culture Documents
Reviewer APC 5
Reviewer APC 5
Reviewer APC 5
Bandwidth
2. The workstation
4. Redundancy
5. Supported communications p
• It is more than just protecting hardware and
software from being crashed
• Confidentiality
• Integrity
• Authentication
Chapter 3 - Security of Information Technology
✓Establishing proof of identity
What is Security?
• Nonrepudiation
1. Freedom from risk or danger; safety.
✓Ability to prove that the sender sent the data
2. Freedom from doubt, anxiety, or fear;
confidence. • Access Control
3. Something that gives or assures safety 4. Is ✓Access to information resources are regulated
the protection of assets. • Availability
The three main aspects are: ✓Computer assets are available to authorized
• Prevention parties when needed
• Detection
• Re-action Security
Worm
Digital Certificates / Signature
Fraud
Risks in Information and Technology • Accessing or using a computer with the intent
to commit a fraudulent or other criminal act. •
Chapter 4
This can refer to illegally obtaining restricted
data or confidential financial information, Website Defacements
damaging or destroying information contained
• Is an act of gaining unauthorized access to an
in a computer.
environment or website. Extortion
Service Interruptions and Delays
• The practice of trying to get something
• An interruption in transmission that renders through force, threats or blackmail Sniffing
the Service unusable due to a total loss of signal
• Process of monitoring and capturing all data
for the Service
packets passing through given network •
Intrusions Sniffers are used by network/system
administrator to monitor and troubleshoot
• the act of wrongfully entering upon, seizing,
network traffic. Attackers use sniffers to capture
or taking possession of the property or
data packets containing sensitive information
information of another individual
such as password, account information etc.
Information Manipulation
Spoofing
• trying to get someone to believe something
• Specific type of cyber-attack in which
untrue is deceit. The type of communication
someone attempts to use a computer, device,
created by such deceitful intent is called a
or network to trick other computer networks by
deceptive message
masquerading as a legitimate entity
Information Theft
Con Artists
• Also known as identity fraud, is a crime in
• A person who cheats or tricks others by
which an imposter obtains key pieces of
persuading them to believe something that is
personally identifiable information (PII), such as
not true
Social Security or driver's license numbers, to
impersonate someone else. Phishing
processing methods
Computer Criminals
Ensuring that authorized users have access to
information and
Terrorist
Computer Criminals
• A person who uses unlawful violence and
intimidation, especially against civilians, in the
Hacker
pursuit of political aims.
• A person who uses computers to gain
Insider
unauthorized access to data
• A person within a group or
Script Kiddies
organization,
• a relatively unskilled individual who uses
especially someone privy to information
scripts or programs, such as a web shell, unavailable to
deface websites,
according to the
programming and
hacking cultures
Cyber-Criminals
TECHNOLOGY 4
12
In fact, advances in information technology not
only provides a positive effect. Many also
Modern Technology
brought along the negative impact of
By the early 21st century, nearly every child in information technology advances.
the Western world, and many in other parts of
15
the world, knew how to use a personal
computer. Businesses' information technology Here's a positive impact of information
departments have gone from using storage technology development.
tapes created by a single computer operator to
Make it easier for companies or individual
interconnected networks of employee
business transaction-based information
workstations that store information in a server
technology or so-called E Commerce.
farm, often somewhere away from the main
business site. Simplify access to information needed for
various purposes.
13
16
Benefits from IT
Education
Job training
Health care
Food security
Environment management
Government efficiency
19
20