Info+Security+Management+NK

Info+Security+Management+NK - InformationSecurity...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
MIS 235 CH12   Chen Zhao Today’s Learning Objective: Information Security Computer Crime and Malicious Activities Information Security Management
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Figure 12-1 Security Threats MIS 235 CH12   Chen Zhao
Background image of page 2
Information Security MIS 235 CH12   Chen Zhao The protection of information  from accidental or intentional  misuse from inside or outside the  organization The first line of defense is people Security is more of a people  issue than a technology issue Majority of misuse comes  from within HSBC: Data theft incident broader than first thought Mar 11, 2010
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Information Security MIS 235 CH12   Chen Zhao 59% of employees who leave or are asked to leave are stealing  company data.  Moreover, 79% of these respondents admit that their former employer  did not permit them to leave with company data.  67% of respondents used their former company’s confidential,  sensitive or proprietary information to leverage a new job.  Approximately 68% are planning to use such information as email  lists , customer contact lists  and employee records  that they stole from  their employer.  Not only is this putting customer and other confidential information at  risk  for a data breach but it could affect companies’ competitiveness  and future revenues Data Loss Risks During Downsizing As Employees Exit so Does the Corporate Data February 23, 2009
Background image of page 4
Malicious Crime Hacking Illegally breaking into a computer system. People very knowledgeable about computers who use their knowledge to invade other people’s computers Electronic breaking and entering Information espionage/intelligence gathering 5 MIS 235 CH12   Chen Zhao Hacker busts IE8 on Windows 7 in 2 minutes Mar 25, 2010 Two Dutch researchers won $10,000 each at the Pwn2Own hacking contest by bypassing DEP/ASLR, important security measures of Windows 7, to bring down Microsoft's browser. Social Networking hacks: Top 10 Facebook and Twitter security sto Unemployed Romanian hacker accused of breaking into NASA Nov 16, 2011 07:41 am | IDG News Service, by Lucian Constantin Robert Butyka, 26, allegedly caused US$500,000 damage to NASA's systems
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
MIS 235 CH12   Chen Zhao As of January 1995 there were about 5,600 PC viruses , about 150 Amiga viruses, 100 Acorn Archimedes viruses, 45 Macintosh viruses, several Atari ST viruses, a few Apple II viruses, four Unix viruses, three MS Windows viruses, at least two OS/2 viruses and two VMS DCL- based viruses… … Malicious Crime Malware  Is a Serious Problem worldwide
Background image of page 6
MIS 235 CH12   Chen Zhao Computer viruses hit one million in 2007 – BBC News Throughout 2007 Symantec detected more than 711,912 novel threats which brings the total number of malicious
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 30

Info+Security+Management+NK - InformationSecurity...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online