SlideShare a Scribd company logo
1 of 13
THREATS
TO
INFORMATION
RESOURCES
Shimna K
3rd Sem MBA
CMS
Information Systems (IS)
An information system(IS) is typically considered to be a set of
interrelated elements or components that
collect(input), manipulate(processes), and disseminate (output)
data and information and provide a feedback mechanism to meet
an objective.

Information Systems Security
It refers to the policies, procedures, and technical measures
adopted to prevent potential threats to IS resources.
IS Security Threats
A threat to an information resource is any danger
to which a system may be exposed.
•
•
•
•
•
•

Human errors or failures
Manipulation of data/systems
Theft of data/system
Destruction from virus
Technical; failure/errors of systems
Natural disasters like
flood, fire, earthquake, etc
1. Human Errors or Failures
Unintentional errors
Entry of wrong data
Accidental deletion
Modification of data
Storage of data in unprotected areas like desktop, website, trash bin
Disclosing of confidential data
These errors may happen because of;

Lack of experience
Improper training
2. Manipulation of data/systems
This category of threats happens because of Deliberate
acts to harm the data or IS of an organization.
An unauthorized individual gains an access to the
private/confidential or important data of an organization.
Intentionally do some wrong acts like delete, corrupt or
steal the data.
3. Theft of data/systems
It is a deliberate attempt of some person to steal the
important data of an organization.
Thieves may steal physical items like entire pc, circuit
boards & memory chips, the theft of electronic data pose
a greater challenge.
Telecommunication networks are highly misused by
computer experts.
The person who intercepts the communication lines to
steal data without the knowledge of the owner of the
data is known as hacker.
4. Destruction from virus
Deliberate software attack

This kind of attack happens when a person or a group write
software to attack data or IS of and organization with the
purpose to damage, destroy, or deny service to the target
systems.
The programme which is written with an intent to attack
data or IS is known as malicious code or malicious
software or malware.
Eg: viruses and worms, Trojan horses, logic-bombs etc.
The computer viruses are the secret instructions inserted into
programs or data that run during ordinary tasks. The secret
instructions may destroy or alter data as well as spread within or
between computer systems.

Worms refers to a program which replicates itself constantly
and penetrates a valid computer system.
Trojan horses refers to illegal programs contained within
another useful or beneficial program, that hide their true nature
or sleeps until some specific event occurs hen triggers the
illegal program becomes infected which is not known to
the user. Many viruses can be hidden in Trojan horses,
but Trojan horses do no have the ability to replicate
themselves.
Logic bombs or time bomb is a kind of programme that executes
when certain conditions are met. It is similar to Trojan horse in its
ability to damage data but it activates at a particular time.
5. Technical failure/ errors of systems
Manufacturing defects in the hardware or the hidden faults in the
software.
Unique combinations of certain software and hardware may give
new errors.
Technological obsolescence.
6. Natural disasters
Not because of unintentional or deliberate acts.
Threats include fire, flood, earthquake, lightning etc.
REFERENCE
MIS, DP GOYAL
INTERNET
Threats to Information Resources - MIS - Shimna

More Related Content

What's hot

Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityarun alfie
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityDevOps.com
 

What's hot (20)

Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
8. operations security
8. operations security8. operations security
8. operations security
 
Security system in banks
Security system in banksSecurity system in banks
Security system in banks
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Security policies
Security policiesSecurity policies
Security policies
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
 

Viewers also liked

Viewers also liked (19)

Top 10 Reasons for ERP Project Failure
Top 10 Reasons for ERP Project FailureTop 10 Reasons for ERP Project Failure
Top 10 Reasons for ERP Project Failure
 
ERP and MIS
ERP and MISERP and MIS
ERP and MIS
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Erp benefits
Erp benefitsErp benefits
Erp benefits
 
Chapter 6 Mis And Erp
Chapter 6 Mis And ErpChapter 6 Mis And Erp
Chapter 6 Mis And Erp
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Customer relationship management in mis ppt
Customer relationship management in mis pptCustomer relationship management in mis ppt
Customer relationship management in mis ppt
 
MIS 13 Customer Relationship Management
MIS 13 Customer Relationship ManagementMIS 13 Customer Relationship Management
MIS 13 Customer Relationship Management
 
DATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MININGDATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MINING
 
OLAP
OLAPOLAP
OLAP
 
Warehousing
WarehousingWarehousing
Warehousing
 
CRM with MIS
CRM with MISCRM with MIS
CRM with MIS
 
Porter's Value Chain Presentation 1
Porter's Value Chain Presentation 1Porter's Value Chain Presentation 1
Porter's Value Chain Presentation 1
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Basics of Supply Chain Managment
Basics of Supply Chain ManagmentBasics of Supply Chain Managment
Basics of Supply Chain Managment
 
Customer Relationship Management (CRM)
Customer Relationship Management (CRM)Customer Relationship Management (CRM)
Customer Relationship Management (CRM)
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain Management
 
Value chain analysis
Value chain analysisValue chain analysis
Value chain analysis
 

Similar to Threats to Information Resources - MIS - Shimna

Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityAliyuMuhammadButu
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
Health information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskHealth information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskDr. Lasantha Ranwala
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Komal Mehfooz
 
Threat vs risk vs attack vs Asset vs vulnerability
Threat vs risk vs attack vs Asset vs  vulnerability Threat vs risk vs attack vs Asset vs  vulnerability
Threat vs risk vs attack vs Asset vs vulnerability Osama Ellahi
 
Cyber security
Cyber securityCyber security
Cyber securitygogulraj25
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Computer Threat.pdf
Computer Threat.pdfComputer Threat.pdf
Computer Threat.pdfZaraFatima29
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 

Similar to Threats to Information Resources - MIS - Shimna (20)

Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
Need for security
Need for securityNeed for security
Need for security
 
Computer security
Computer securityComputer security
Computer security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
System tThreats
System tThreatsSystem tThreats
System tThreats
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Health information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskHealth information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and risk
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Threat vs risk vs attack vs Asset vs vulnerability
Threat vs risk vs attack vs Asset vs  vulnerability Threat vs risk vs attack vs Asset vs  vulnerability
Threat vs risk vs attack vs Asset vs vulnerability
 
Cyber security
Cyber securityCyber security
Cyber security
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Computer Threat.pdf
Computer Threat.pdfComputer Threat.pdf
Computer Threat.pdf
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 

Recently uploaded

8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 

Recently uploaded (20)

8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 

Threats to Information Resources - MIS - Shimna

  • 2. Information Systems (IS) An information system(IS) is typically considered to be a set of interrelated elements or components that collect(input), manipulate(processes), and disseminate (output) data and information and provide a feedback mechanism to meet an objective. Information Systems Security It refers to the policies, procedures, and technical measures adopted to prevent potential threats to IS resources.
  • 3. IS Security Threats A threat to an information resource is any danger to which a system may be exposed. • • • • • • Human errors or failures Manipulation of data/systems Theft of data/system Destruction from virus Technical; failure/errors of systems Natural disasters like flood, fire, earthquake, etc
  • 4. 1. Human Errors or Failures Unintentional errors Entry of wrong data Accidental deletion Modification of data Storage of data in unprotected areas like desktop, website, trash bin Disclosing of confidential data These errors may happen because of; Lack of experience Improper training
  • 5. 2. Manipulation of data/systems This category of threats happens because of Deliberate acts to harm the data or IS of an organization. An unauthorized individual gains an access to the private/confidential or important data of an organization. Intentionally do some wrong acts like delete, corrupt or steal the data.
  • 6. 3. Theft of data/systems It is a deliberate attempt of some person to steal the important data of an organization. Thieves may steal physical items like entire pc, circuit boards & memory chips, the theft of electronic data pose a greater challenge. Telecommunication networks are highly misused by computer experts. The person who intercepts the communication lines to steal data without the knowledge of the owner of the data is known as hacker.
  • 7. 4. Destruction from virus Deliberate software attack This kind of attack happens when a person or a group write software to attack data or IS of and organization with the purpose to damage, destroy, or deny service to the target systems. The programme which is written with an intent to attack data or IS is known as malicious code or malicious software or malware. Eg: viruses and worms, Trojan horses, logic-bombs etc.
  • 8. The computer viruses are the secret instructions inserted into programs or data that run during ordinary tasks. The secret instructions may destroy or alter data as well as spread within or between computer systems. Worms refers to a program which replicates itself constantly and penetrates a valid computer system. Trojan horses refers to illegal programs contained within another useful or beneficial program, that hide their true nature or sleeps until some specific event occurs hen triggers the illegal program becomes infected which is not known to the user. Many viruses can be hidden in Trojan horses, but Trojan horses do no have the ability to replicate themselves.
  • 9. Logic bombs or time bomb is a kind of programme that executes when certain conditions are met. It is similar to Trojan horse in its ability to damage data but it activates at a particular time.
  • 10. 5. Technical failure/ errors of systems Manufacturing defects in the hardware or the hidden faults in the software. Unique combinations of certain software and hardware may give new errors. Technological obsolescence.
  • 11. 6. Natural disasters Not because of unintentional or deliberate acts. Threats include fire, flood, earthquake, lightning etc.