Your SlideShare is downloading. ×
3 Most Common Threats Of Information Security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

3 Most Common Threats Of Information Security

40,481
views

Published on


0 Comments
4 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
40,481
On Slideshare
0
From Embeds
0
Number of Embeds
12
Actions
Shares
0
Downloads
532
Comments
0
Likes
4
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms. Computer security can focus on ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer.
  • A rootkit is malware which consists of a program (or combination of several programs) designed to take fundamental control (in Unix terms "root" access, in Windows terms, "Administrator" or "Admin" access) of a computer system, without authorization by the system's owners and legitimate managers
  • A denial-of-service attack ( DoS attack ) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted, malevolent efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even DNS root servers . Loss of confidentiality E-mails are sent in clear over open networks E-mails stored on potentially insecure clients and mail servers Loss of integrity No integrity protection on e-mails; body can be altered in transit or on mail server
  • POP, IMAP over ssh, SSL – protokoli PGP – enkripcija I dekripcija
  • Viruses Programs that can be attached to emails and are spread as files from individual to individual. Viruses are intentionally destructive Worms Self replicating computers programs, similar to computer viruses however do not require other programs or documents to spread. Trojans non-replicating malicious programs which appears harmless or even useful to the user but when executed harms the user’s System Spyware Programs installed on computers which record and send your personal information – includes marketing info( visited sites, lists of your software, your interests ,etc…) Phishing attempt to fraudulently acquire sensitive information, such as password and financial information, through email or an instant message
  • In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. A social engineer runs what used to be called a "con game". Social Engineering is clever manipulation of the natural human tendency to trust. As a rule, public sector employees care about the jobs they do and try their best to be helpful. “ Social engineering attacks are mostly financially driven, with the attacker looking to obtain confidential information. Some of the common tactics used for such attacks are forging identities, exploiting the inability of people to realize the value of the data held by them or the know-how to protect data. Most users perceive a false sense of security once they install an anti-virus or anti spam solution. That’s why along with providing security solutions, we look to educate our customers on the various current and evolving security threats that take place and how to be immune from them.” said Govind Rammurthy CEO, MicroWorld.
  • Transcript

    • 1. Most common threats to information security Ana Meskovska [email_address] ELSA Conference Strumica, 27.11.2008
    • 2. Contents
      • Introduction
      • What is an information security threat?
      • Information security threats
      • Internet security threats
      • Most common threats, possible consequences and protection
      • Top 10 internet threats
    • 3. Introduction
      • Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction
        • through implementation of ISMS i.e. implementation of controls (policies and procedures)
        • the CIA aspect - Confidentiality, Integrity and Availability
      • Computer security is a branch of technology known as information security as applied to computers.
        • ensuring the availability and correct operation of a computer system
    • 4. What is an information security threat?
      • A threat is any circumstance or event with the potential to harm an information system through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.
      • Threats can be:
        • Natural or Human
        • Deliberate or Accidental
    • 5. Information security threats
      • People / employees
      • Low awareness for information security aspects
      • Advancing the IT infrastructure, networking and distributive working
      • Improvement of complexity and effectiveness of hackers and viruses
      • Electronic mail (e-mail)
      • Fire, flood, earthquake
    • 6. Information Security Breaches Survey 2008 1/3
      • What type of breaches did UK business suffer?
    • 7. Information Security Breaches Survey 2008 2/3
      • How many UK businesses have disaster recovery plans?
      How many UK businesses have disaster recovery plans?
    • 8. Information Security Breaches Survey 2008 3/3
      • How did UK businesses address the weakness that caused their worst incident?
    • 9. Internet security threats
      • Malware Threat
      • Threats to the Security of E-mail
      • SPAM Associated Threats
      • Social Engineering Threat (Phishing)
    • 10. Most common internet threats, consequences and protection Malware threats
    • 11. Malware threat
      • Malware is software designed to destroy, steal private information or spy on a computer system without the consent of the user.
      • Malwares - malicious codes, malicious programs or malicious software
      • The most popular categories are Trojan Horses, viruses, adwares, spywares, spams, worms and root kits.
    • 12. Security and productivity threats posed by malware
      • Stolen user ID and passwords
      • Unauthorized access to confidential information
      • Loss of intellectual property
      • Remote control of company’s PC
      • Theft of customer data
      • Reduced network performance and bandwidth
      • Increased internet traffic and changes to browser homes pages and search engines
    • 13. Protection against malwares
      • Good user education is vital in fighting against malwares
      • Keep your operating system up to date by installing OS security fixes and program patches.
      • Use firewall protection
      • Install anti-spyware softwares
      • Monitor logs for unusual traffic
    • 14. Most common internet threats, consequences and protection E-mail threats
    • 15. Threats to the security of e-mail
      • Disclosure of sensitive information
        • Loss of confidentiality
        • Loss of integrity
      • Exposure of systems to malicious code
      • Denial-of-Service (DoS)
      • Unauthorized accesses
    • 16. Countermeasures to e-mail security
      • Secure the server to client connections
        • POP, IMAP over ssh, SSL
        • https access to webmail
        • Protection against insecure wireless access
      • Secure the end-to-end email delivery
        • The PGPs of the world
        • Still need to get the other party to be PGP aware
        • Practical in an enterprise intra-network environment
    • 17. When using an e-mail
      • Ensure you are addressing the right person prior to sending email
      • Beware of e-mails from unknown parties (unsolicited e-mails)
      • Do not open unsolicited emails
      • Do not click on links in unsolicited emails
      • Never respond to unsolicited emails
      • e.g. ‘ You have won $1,000,000. Kindly send your bank details for crediting your account.’ These are scams also known as social engineering attacks
    • 18. Precautions when using a e-mail
      • Suspicious attachments must NOT be opened e.g. Executable files (with .exe, .com, .bat, .reg extensions)
      • Regularly purge unnecessary emails (including emptying the ‘Deleted Items’) to free storage space
      • Do not open/reply to spam messages
      • Avoid registering unnecessarily to mailing lists
      • Use properly configured & regularly updated spam filter, antivirus and antispyware software
      • Use firewall as well
    • 19. Most common internet threats, consequences and protection SPAM
    • 20. Security threats from SPAM
        • SPAM provides a cover for spreading of:
          • Viruses
          • Worms
          • Trojans
          • Spyware
          • Phishing
    • 21. Countermeasures
      • Spam Filters
        • MS Outlook, Outlook Express…(e.g. SPAMFight)
        • Spamfighter for Outlook and Outlook express
      • Antivirus
        • AVG, Symantec, McAfee, F-Secure, VIRUSfighter….
      • Antispyware
        • McAfee Antispyware module, S&D , Ad-Adaware SE personal, SPYWAREfighter….
    • 22. Most common internet threats, consequences and protection Social Engineering Threat (Phishing)
    • 23. Social Engineering
      • Social engineering is the art of manipulating people into performing actions or divulging confidential information
      • “ Employees without security awareness are security liabilities.”
      • Gartner Group, 2002
    • 24. Security threats from phishing
      • Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication
      • Use of Email messages and Web pages that are replicas of existing sites to fool users into submitting:
        • personal,
        • financial or
        • password data
    • 25. Prevention
      • Don't give out personal information
      • Ensure you are on the right website with the right web address
      • Use anti-phishing software – IE7 and Mozilla, McAfee, Firefox 2.0 (includes a form of anti - phishing technology)
      • Research shows that employees who are sensitive and knowledgeable about information security provide the most cost-effective countermeasure against information security violations
    • 26. Top 10 internet threats
    • 27. TOP 10 threats
      • SPAM mail 
      • Phishing mail 
      • Wireless attack
      • Hacker attack
      • Web exploits 
      • Adware
      • Viruses 
      • Spyware/Trojans
      • Identity theft
      • Social engineering
    • 28. Conclusion
      • Avoid giving unnecessary information online (e.g. subscribing to a newsletter whereby your personal details are requested)
      • Be sure you are dealing with someone or a site that you know and trust before giving out personal information
      • Use regularly updated antivirus and antispyware software
      • Use client filters or ISPs based filters

    ×