PowerPoint Presentation

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

[Audio] Hi This is Jaya Surya vajrala Biggest Information Security Threat.

Scene 2 (7s)

[Audio] Information Security Threats Any situation or occurrence that has the potential to damage an information management system by illegal access, eventually destroying, disclosure, alteration, and/or denial of service is considered to be a threat. . Threats include: Human or natural Intentional or Accidental.

Scene 3 (31s)

[Audio] Internet Threats Natural disaster Infrastructure failure Internal abuse Accident External targeted attack External mass attack.

Scene 4 (49s)

[Audio] Source of Security Threats People / employees Low awareness for information securityaspects Advancing the IT infrastructure, networking and distributiveworking Improvement of complexity and effectiveness of hackers andviruses Electronic mail ( e-mail) Fire, flood, earthquake.

Scene 5 (1m 17s)

[Audio] This type of threat is differentiated by the longevity of the attack attempts and generally the resourcefulness of the attacker to attempt many attack vectors until successful.

Scene 6 (1m 27s)

[Audio] A hacker is a threat source, while unauthorized access is the threat action. Therefore, the threat in this scenario is unauthorized access by a hacker. A threat source can typically have more than one threat action.

Scene 7 (1m 44s)

[Audio] Threat agent and Action External Intruders, Malicious Insiders, Malicious Code - Social engineering of system user Malicious code, Users- Intentional or accidental denial of service event Malicious Insider, Users- Unauthorized users performing unauthorized operations. Malicious Insider, Users - Unchecked data viewing or alteration.

Scene 8 (2m 13s)

[Audio] Non-Specific, Natural - Failure of network infrastructure - Loss of power Users Abuse of user rights and permissions Denial of user actions or activity Eavesdropping and Interception of data Intentional or accidental transmission of regulated data Intentional or unintentional violations of the system security policy Unreported security events regarding system use.

Scene 9 (2m 47s)

[Audio] Security and productivity threats by malware Stolen user ID andpasswords Unauthorized access to confidential information Loss of intellectual property Remote control of company's PC Theft of customer data Reduced network performance and bandwidth Increased internet traffic and changes to browser homes pages and search engines.

Scene 10 (3m 18s)

[Audio] Top Security Threats SPAM mai Phishing mail Wireless attack Hacker attack WebexploitsAdware Viruses SpywareTrojans Identity theft Social engineering.

Scene 11 (3m 42s)

[Audio] Security Measures User Name & Password security implemented No unauthorized person can handle any operation without username and Password Only authorized person can log-on the system. Only authorized person can update the records. Only authorized person can handle the reservation. Only authorized person can print the report..

Scene 12 (4m 11s)

[Audio] Conclusion Avoid giving unnecessary information online Be sure individuals are dealing with someone or a site that you know and trust before giving out personal information Use regularly updated antivirus and antispyware software Do not open/ reply to spam messages.

Scene 13 (4m 35s)

References Safa, N, S., Maple, C., Furnell, S., Azad, M, A., Charith Perera , C., Dabbagh , M. & Sookhak , M. (2019). Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Generation Computer Systems, 97(2), 587-597. Maple, C., Safa, N, S., Watson, T. & Solms , R, V. (2018). Motivation and opportunity based model to reduce information security insider threats in organisations Journal of information security and applications, 40(2), 247-257..