Professional Documents
Culture Documents
TopMgAwarnessPPt v2.0
TopMgAwarnessPPt v2.0
11/08/2021 1
እንèN bdU³ Welcome!!
m½{uƒ!
11/08/2021 2
Presentation Outline
Conclusion
An Overview of Information systems
Security
Definitions: Information System Security: ”A state of well-being of
information and infrastructure in which the possibility of theft,
tampering, and disruption of information and services is kept low or
tolerable.”
Information System
Components -PPT
{
Cont’d….
• Injury or damage for those who have had their private information exposed.
• Employee discipline.
In April 2020, Google blocked 18 million daily malware and phishing emails related to
Coronavirus. (Google)
Grand Total 53
Information Security
common threats in Cyber
Space
Grouping Threats:
• Malware - Virus, Worm, Trojan,
Spyware, Ransom ware, Spam,
Botnet, Backdoor……
• Social Engineering
• Invoice fraud
• Phishing
o Vishing
o Smishing
o CEO Fraud /Attack
Malware
‘Malware’, short for ‘malicious
software’, used by criminals to disrupt
computer operations and access
confidential information.
Baiting It involves leaving a piece of portable storage media such as a CD, USB
stick in an open location to attract a victim into seeing what's on it.
The email may be designed to contain and deliver malware via an attachment or a link. If the
link is clicked or the attachment opened, the criminal will be able to gain access to your system.
Vishing and Smishing
• Vishing (voice phishing)
Example
it occurs when
fraudsters
pretend to be a
senior manager-
often the CEO -
in order to
persuade a staff
member to make
a payment.
Business Email Compromise A Business Email Compromise (BEC) is a special type of
(BEC)
phishing attack that is becoming increasingly prevalent.
• BEC attacks are designed to impersonate senior
executives and trick employees, customers or
vendors into wiring payment for goods or services to
alternate bank accounts.
11/08/2021 39