2. 1. 10010813 ABDUL-MUMIN FAIZA KOUANDA
2. 10010208 AGYARE RICHMOND KWAME
3. 10012277 BOADU - MARFO ERIC
4. 10011245 KASU MICHAEL ELIKEM
5. 10011261 HADZI LETICIA
6. 10010510 DE-GRAFT KELLY COLEMAN
MEMBERS
3. INTRODUCTION
☼ Threat is defined by Encarta dictionary as “somebody or
something likely to cause harm”
☼ A threat to an information resource is any danger to which
a system may be exposed
In this era of computer age, most companies and information technology users
are faced with numerous challenges/threats.
Information security and system are old concepts used by people, businesses,
politicians, military leaders and others to protect “sensitive” information from
unauthorized or accidental loss, destruction, disclosure, modification, misuse or
access.
A number of factors contribute to the increasing vulnerability 0f organizational
information assets.
4. DIFFERENCES BASE ON THEIR FACTORS
Threats to Information Security
☼ Today's interconnected, interdependent,
wirelessly networked business
environment.
☼ Smaller, faster, cheaper computer and
storage devices.
☼ Decreasing skills necessary to be a
computer hacker.
☼ Increased employee use of unmanaged
devices.
☼ Lack of management support
Threats to Information
System
☼ Unintentional Acts
☼ Natural Disasters
☼ Technical Failures
☼ Management Failures
☼ Deliberate Acts
5. THREATS TO INFORMATION SECURITY
1. Today's interconnected,
interdependent, wirelessly networked
business environment –
Wireless technologies enable employees
to compute, communicate and access the
internet anywhere anytime.
Significantly, Wireless technology is an
inherently non-secure broadcast
communication medium.
2. Smaller, faster, cheaper computer and
storage devices…
This is where modern computers and
storage devices(E.g. Ipads, Flash drives)
continue to become smaller, faster,
cheaper and more portable with greater
storage capacity.
These characteristics makes it much easier
to steal or lose a computer or storage
device that may contain huge sensitive
information.
6. THREATS TO INFORMATION SECURITY CONT…
3. Decreasing skills necessary
to be a computer hacker.
The computing skills needed to
be a computer hacker are
decreasing . This is because the
internet contains information
and computer programs called
scripts that users with few
skills can download and use to
attack any information system
connected to the internet.
4. Increased employee use of
unmanaged devices.
This involves the use of
devices outside the control of
an organization’s I.T
department. These devices
include customized computers,
business partners’ mobile
devices, computers in the
business.
7. THREATS TO INFORMATION SECURITY LAST POINT
5. Lack of management support
For effective and efficient security measures and
procedure to be taken seriously, lower
management should be supported by top level
management in determining whether employees
are following security policies and procedures.
8. THREATS TO INFORMATION SYSTEMS
1. Unintentional acts
These are those acts with no
malicious intent. Human errors,
deviation in the quality of service
providers and environmental
hazards are the types of
unintentional acts.
Human errors represents the most
serious threats to information
systems than the other two types.
2. Natural Disasters
These disaster include; flood,
earthquakes, hurricanes, tornadoes,
lightning and in some cases, fires.
These disasters are sometimes referred
to as acts of God and can cause
catastrophic losses of systems and
data.
Such losses can be avoided by
engaging in proper planning for
backup and recovery of information
systems and data.
9. THREATS TO INFORMATION SYSTEMS CONT…
3. Management Failures
Management failures involve a
lack of funding for information
security efforts and a lack of
interest in those efforts.
Such lack of leadership will cause
the information security of the
organization to suffer.
4. Deliberate Acts
Deliberate acts by organizational employees
account for a large number of information
security breaches.
Some types of deliberate acts includes;
☼ information extortion
☼ sabotage and vandalism
☼ theft of equipment or information
☼ identity theft
10. THREATS TO INFORMATION SYSTEMS LAST POINT
5. Technical failures
Technical failures include problems with hardware and
software.
The most common hardware problem is a crash of a hard
disk drive.
The most common software problem is errors; called bugs
in computer programs. Software bugs are so common that
the entire websites are dedicated to documenting them..
11. CONCLUSION
Threats to information security and
threats to information systems have no
much distinctions as both relate to
loss of sensitive information and data.