SlideShare a Scribd company logo
1 of 14
PRESENTATION BY
GROUP 13
Differences between threats to information
security and threats to information systems.
ON
1. 10010813 ABDUL-MUMIN FAIZA KOUANDA
2. 10010208 AGYARE RICHMOND KWAME
3. 10012277 BOADU - MARFO ERIC
4. 10011245 KASU MICHAEL ELIKEM
5. 10011261 HADZI LETICIA
6. 10010510 DE-GRAFT KELLY COLEMAN
MEMBERS
INTRODUCTION
☼ Threat is defined by Encarta dictionary as “somebody or
something likely to cause harm”
☼ A threat to an information resource is any danger to which
a system may be exposed
In this era of computer age, most companies and information technology users
are faced with numerous challenges/threats.
Information security and system are old concepts used by people, businesses,
politicians, military leaders and others to protect “sensitive” information from
unauthorized or accidental loss, destruction, disclosure, modification, misuse or
access.
A number of factors contribute to the increasing vulnerability 0f organizational
information assets.
DIFFERENCES BASE ON THEIR FACTORS
Threats to Information Security
☼ Today's interconnected, interdependent,
wirelessly networked business
environment.
☼ Smaller, faster, cheaper computer and
storage devices.
☼ Decreasing skills necessary to be a
computer hacker.
☼ Increased employee use of unmanaged
devices.
☼ Lack of management support
Threats to Information
System
☼ Unintentional Acts
☼ Natural Disasters
☼ Technical Failures
☼ Management Failures
☼ Deliberate Acts
THREATS TO INFORMATION SECURITY
1. Today's interconnected,
interdependent, wirelessly networked
business environment –
Wireless technologies enable employees
to compute, communicate and access the
internet anywhere anytime.
Significantly, Wireless technology is an
inherently non-secure broadcast
communication medium.
2. Smaller, faster, cheaper computer and
storage devices…
This is where modern computers and
storage devices(E.g. Ipads, Flash drives)
continue to become smaller, faster,
cheaper and more portable with greater
storage capacity.
These characteristics makes it much easier
to steal or lose a computer or storage
device that may contain huge sensitive
information.
THREATS TO INFORMATION SECURITY CONT…
3. Decreasing skills necessary
to be a computer hacker.
The computing skills needed to
be a computer hacker are
decreasing . This is because the
internet contains information
and computer programs called
scripts that users with few
skills can download and use to
attack any information system
connected to the internet.
4. Increased employee use of
unmanaged devices.
This involves the use of
devices outside the control of
an organization’s I.T
department. These devices
include customized computers,
business partners’ mobile
devices, computers in the
business.
THREATS TO INFORMATION SECURITY LAST POINT
5. Lack of management support
For effective and efficient security measures and
procedure to be taken seriously, lower
management should be supported by top level
management in determining whether employees
are following security policies and procedures.
THREATS TO INFORMATION SYSTEMS
1. Unintentional acts
These are those acts with no
malicious intent. Human errors,
deviation in the quality of service
providers and environmental
hazards are the types of
unintentional acts.
Human errors represents the most
serious threats to information
systems than the other two types.
2. Natural Disasters
These disaster include; flood,
earthquakes, hurricanes, tornadoes,
lightning and in some cases, fires.
These disasters are sometimes referred
to as acts of God and can cause
catastrophic losses of systems and
data.
Such losses can be avoided by
engaging in proper planning for
backup and recovery of information
systems and data.
THREATS TO INFORMATION SYSTEMS CONT…
3. Management Failures
Management failures involve a
lack of funding for information
security efforts and a lack of
interest in those efforts.
Such lack of leadership will cause
the information security of the
organization to suffer.
4. Deliberate Acts
Deliberate acts by organizational employees
account for a large number of information
security breaches.
Some types of deliberate acts includes;
☼ information extortion
☼ sabotage and vandalism
☼ theft of equipment or information
☼ identity theft
THREATS TO INFORMATION SYSTEMS LAST POINT
5. Technical failures
Technical failures include problems with hardware and
software.
The most common hardware problem is a crash of a hard
disk drive.
The most common software problem is errors; called bugs
in computer programs. Software bugs are so common that
the entire websites are dedicated to documenting them..
CONCLUSION
Threats to information security and
threats to information systems have no
much distinctions as both relate to
loss of sensitive information and data.
REFERENCES
☼Whitman and Mattord (2003)
☼Professional Application (First Edition)
☼Encarta dictionaries (2009)
Group 13
Group 13

More Related Content

What's hot

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systemshilal12
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environmentEvan Francen
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurvkarthi314
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policyeverestsky66
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
Norman critical thinking 1
Norman critical thinking 1 Norman critical thinking 1
Norman critical thinking 1 qnorman
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital FirmMohamad Fathi
 
Cyber security and mobile devices
Cyber security and mobile devicesCyber security and mobile devices
Cyber security and mobile devicesUmer Saeed
 
Computer Use Policy EK Computers
Computer Use Policy EK ComputersComputer Use Policy EK Computers
Computer Use Policy EK ComputersKirstin Long
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0Jon Collins
 
Keamanan informasi
Keamanan informasiKeamanan informasi
Keamanan informasiNova Novelia
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)Sandeep Agarwal
 
Cyber security report in m asteral
Cyber security report in m asteralCyber security report in m asteral
Cyber security report in m asteralwhilma teodoro
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 
WSO2Con EU 2016: Reinforcing Your Enterprise with Security Architectures
WSO2Con EU 2016: Reinforcing Your Enterprise  with Security ArchitecturesWSO2Con EU 2016: Reinforcing Your Enterprise  with Security Architectures
WSO2Con EU 2016: Reinforcing Your Enterprise with Security ArchitecturesWSO2
 
Humming Heads Presentation
Humming Heads PresentationHumming Heads Presentation
Humming Heads PresentationDansha
 

What's hot (20)

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
I0516064
I0516064I0516064
I0516064
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systems
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
Chapter 5 MIS
Chapter 5 MISChapter 5 MIS
Chapter 5 MIS
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policy
 
The need for security
The need for securityThe need for security
The need for security
 
Norman critical thinking 1
Norman critical thinking 1 Norman critical thinking 1
Norman critical thinking 1
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firm
 
Cyber security and mobile devices
Cyber security and mobile devicesCyber security and mobile devices
Cyber security and mobile devices
 
Computer Use Policy EK Computers
Computer Use Policy EK ComputersComputer Use Policy EK Computers
Computer Use Policy EK Computers
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0
 
Keamanan informasi
Keamanan informasiKeamanan informasi
Keamanan informasi
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)
 
Cyber security report in m asteral
Cyber security report in m asteralCyber security report in m asteral
Cyber security report in m asteral
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
WSO2Con EU 2016: Reinforcing Your Enterprise with Security Architectures
WSO2Con EU 2016: Reinforcing Your Enterprise  with Security ArchitecturesWSO2Con EU 2016: Reinforcing Your Enterprise  with Security Architectures
WSO2Con EU 2016: Reinforcing Your Enterprise with Security Architectures
 
Humming Heads Presentation
Humming Heads PresentationHumming Heads Presentation
Humming Heads Presentation
 

Similar to Group 13

Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisIJERD Editor
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)Rohana K Amarakoon
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Securityijtsrd
 
Nonprofit Security Matters: It's Not About the Network
Nonprofit Security Matters: It's Not About the NetworkNonprofit Security Matters: It's Not About the Network
Nonprofit Security Matters: It's Not About the NetworkHolly Ross
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxUse speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxgidmanmary
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...Stefano Maria De' Rossi
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.Ni
 
Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Monica Rivera
 
4b - Security Management - Cyber Security Mgt (1).pptx
4b - Security Management - Cyber Security Mgt (1).pptx4b - Security Management - Cyber Security Mgt (1).pptx
4b - Security Management - Cyber Security Mgt (1).pptxromawoodz
 
a) In terms of software risk,an event is any situation or happening .pdf
a) In terms of software risk,an event is any situation or happening .pdfa) In terms of software risk,an event is any situation or happening .pdf
a) In terms of software risk,an event is any situation or happening .pdfanushafashions
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - GuidelinesPedro Espinosa
 

Similar to Group 13 (20)

Module -5 Security.pdf
Module -5 Security.pdfModule -5 Security.pdf
Module -5 Security.pdf
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
MIS 7.pptx
MIS 7.pptxMIS 7.pptx
MIS 7.pptx
 
Network security
Network securityNetwork security
Network security
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
Nonprofit Security Matters: It's Not About the Network
Nonprofit Security Matters: It's Not About the NetworkNonprofit Security Matters: It's Not About the Network
Nonprofit Security Matters: It's Not About the Network
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
 
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxUse speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
4b - Security Management - Cyber Security Mgt (1).pptx
4b - Security Management - Cyber Security Mgt (1).pptx4b - Security Management - Cyber Security Mgt (1).pptx
4b - Security Management - Cyber Security Mgt (1).pptx
 
a) In terms of software risk,an event is any situation or happening .pdf
a) In terms of software risk,an event is any situation or happening .pdfa) In terms of software risk,an event is any situation or happening .pdf
a) In terms of software risk,an event is any situation or happening .pdf
 
MIS chap # 9.....
MIS chap # 9.....MIS chap # 9.....
MIS chap # 9.....
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 

Recently uploaded

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 

Recently uploaded (20)

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 

Group 13

  • 1. PRESENTATION BY GROUP 13 Differences between threats to information security and threats to information systems. ON
  • 2. 1. 10010813 ABDUL-MUMIN FAIZA KOUANDA 2. 10010208 AGYARE RICHMOND KWAME 3. 10012277 BOADU - MARFO ERIC 4. 10011245 KASU MICHAEL ELIKEM 5. 10011261 HADZI LETICIA 6. 10010510 DE-GRAFT KELLY COLEMAN MEMBERS
  • 3. INTRODUCTION ☼ Threat is defined by Encarta dictionary as “somebody or something likely to cause harm” ☼ A threat to an information resource is any danger to which a system may be exposed In this era of computer age, most companies and information technology users are faced with numerous challenges/threats. Information security and system are old concepts used by people, businesses, politicians, military leaders and others to protect “sensitive” information from unauthorized or accidental loss, destruction, disclosure, modification, misuse or access. A number of factors contribute to the increasing vulnerability 0f organizational information assets.
  • 4. DIFFERENCES BASE ON THEIR FACTORS Threats to Information Security ☼ Today's interconnected, interdependent, wirelessly networked business environment. ☼ Smaller, faster, cheaper computer and storage devices. ☼ Decreasing skills necessary to be a computer hacker. ☼ Increased employee use of unmanaged devices. ☼ Lack of management support Threats to Information System ☼ Unintentional Acts ☼ Natural Disasters ☼ Technical Failures ☼ Management Failures ☼ Deliberate Acts
  • 5. THREATS TO INFORMATION SECURITY 1. Today's interconnected, interdependent, wirelessly networked business environment – Wireless technologies enable employees to compute, communicate and access the internet anywhere anytime. Significantly, Wireless technology is an inherently non-secure broadcast communication medium. 2. Smaller, faster, cheaper computer and storage devices… This is where modern computers and storage devices(E.g. Ipads, Flash drives) continue to become smaller, faster, cheaper and more portable with greater storage capacity. These characteristics makes it much easier to steal or lose a computer or storage device that may contain huge sensitive information.
  • 6. THREATS TO INFORMATION SECURITY CONT… 3. Decreasing skills necessary to be a computer hacker. The computing skills needed to be a computer hacker are decreasing . This is because the internet contains information and computer programs called scripts that users with few skills can download and use to attack any information system connected to the internet. 4. Increased employee use of unmanaged devices. This involves the use of devices outside the control of an organization’s I.T department. These devices include customized computers, business partners’ mobile devices, computers in the business.
  • 7. THREATS TO INFORMATION SECURITY LAST POINT 5. Lack of management support For effective and efficient security measures and procedure to be taken seriously, lower management should be supported by top level management in determining whether employees are following security policies and procedures.
  • 8. THREATS TO INFORMATION SYSTEMS 1. Unintentional acts These are those acts with no malicious intent. Human errors, deviation in the quality of service providers and environmental hazards are the types of unintentional acts. Human errors represents the most serious threats to information systems than the other two types. 2. Natural Disasters These disaster include; flood, earthquakes, hurricanes, tornadoes, lightning and in some cases, fires. These disasters are sometimes referred to as acts of God and can cause catastrophic losses of systems and data. Such losses can be avoided by engaging in proper planning for backup and recovery of information systems and data.
  • 9. THREATS TO INFORMATION SYSTEMS CONT… 3. Management Failures Management failures involve a lack of funding for information security efforts and a lack of interest in those efforts. Such lack of leadership will cause the information security of the organization to suffer. 4. Deliberate Acts Deliberate acts by organizational employees account for a large number of information security breaches. Some types of deliberate acts includes; ☼ information extortion ☼ sabotage and vandalism ☼ theft of equipment or information ☼ identity theft
  • 10. THREATS TO INFORMATION SYSTEMS LAST POINT 5. Technical failures Technical failures include problems with hardware and software. The most common hardware problem is a crash of a hard disk drive. The most common software problem is errors; called bugs in computer programs. Software bugs are so common that the entire websites are dedicated to documenting them..
  • 11. CONCLUSION Threats to information security and threats to information systems have no much distinctions as both relate to loss of sensitive information and data.
  • 12. REFERENCES ☼Whitman and Mattord (2003) ☼Professional Application (First Edition) ☼Encarta dictionaries (2009)