2. KEY THREATS – HUMAN FACTORS
• THE GET OUT CLAUSE: “NOT MY FAULT”.
12/11/2014CMPRPATI
2
• ISSUES OCCUR AROUND: 80-90% INTERNALLY
& ONLY 20% EXTERNALLY.
3. LIKELIHOOD OF ATTACKS
IT Students – cracking passwords using Hash Kracker
to gain access to lecturer's partition on the drive:
•Risk Calculation: Risk = Threat x Likelihood x Cost.
•Less than 1% chance of an attack occurring.
Other breaches:
•Inability to hide grades permitting confidential
information to be misused.
12/11/2014CMPRPATI
3
4. MAIN CONTROL'S:
Misuse of Privileges – Sanction.
Protocol Penetration – Consent Form.
Check firewalls & anti-virus software.
Non-Authorisation – Passwords with authentication,
smart cards and biometrics.
Create a vulnerability list - maintain procedures.
Hacker Profiling.
12/11/2014CMPRPATI
4
• Risk Assessment / Auditing processes !!
5. PAUSE FOR THOUGHT - FUTURE ISSUES?
12/11/2014CMPRPATI
5
• A Possible 9/11 of the University Cyber World?
• No, an attack would be unseen until those person(s)
would want you to know.
• Or is it reality?
Blackboard brought to a stand still.
SECURITY IS ONGOING PROCESS !
6. 12/11/2014CMPRPATI
6
For More Information – check out these Links:
HTTPS://WWW.CYBERSTREETWISE.COM
HTTP://WWW.BBC.CO.UK/PROGRAMMES/B04P23
MV : CYBER CRIMES WITH BEN HAMMERSLEY
Next: Risk Assessment to be produced.