1 / 28

Threats and Attacks

Principles of Information Security, 2nd Edition. 2. Identify and understand the threats posed to information security Identify and understand the more common attacks associated with those threats. Learning Objectives Upon completion of this material, you should be able to:. Principles of Informatio

benicio
Télécharger la présentation

Threats and Attacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Principles of Information Security, 2nd Edition 1 Threats and Attacks THREATS TO INFORMATION SECURITY To make sound decisions about information security, create policies, and enforce them, management must be informed of the various kinds of threats facing the organization, its applications, data and information systems. A threat is an object, person, or other entity that represents a constant danger to an asset. To better understand the numerous threats facing the organization, a categorization scheme has been developed allowing us to group threats by their respective activities. By examining each threat category in turn, management can most effectively protect its information through policy, education and training, and technology controls. THREATS TO INFORMATION SECURITY To make sound decisions about information security, create policies, and enforce them, management must be informed of the various kinds of threats facing the organization, its applications, data and information systems. A threat is an object, person, or other entity that represents a constant danger to an asset. To better understand the numerous threats facing the organization, a categorization scheme has been developed allowing us to group threats by their respective activities. By examining each threat category in turn, management can most effectively protect its information through policy, education and training, and technology controls.

    2. Principles of Information Security, 2nd Edition 2 Identify and understand the threats posed to information security Identify and understand the more common attacks associated with those threats Learning Objectives Upon completion of this material, you should be able to: Learning Objectives: Upon completion of this chapter, you should be able to: Understand the business need for information security. Understand a successful information security program is the responsibility of an organizations general management and IT management. Understand the threats posed to information security and the more common attacks associated with those threats. Differentiate threats to information systems from attacks against information systems. Learning Objectives: Upon completion of this chapter, you should be able to: Understand the business need for information security. Understand a successful information security program is the responsibility of an organizations general management and IT management. Understand the threats posed to information security and the more common attacks associated with those threats. Differentiate threats to information systems from attacks against information systems.

    3. Principles of Information Security, 2nd Edition 3 Threats Threat: an object, person, or other entity that represents a constant danger to an asset Management must be informed of the different threats facing the organization By examining each threat category, management effectively protects information through policy, education, training, and technology controls THREATS TO INFORMATION SECURITY To make sound decisions about information security, create policies, and enforce them, management must be informed of the various kinds of threats facing the organization, its applications, data and information systems. A threat is an object, person, or other entity that represents a constant danger to an asset. To better understand the numerous threats facing the organization, a categorization scheme has been developed allowing us to group threats by their respective activities. By examining each threat category in turn, management can most effectively protect its information through policy, education and training, and technology controls. THREATS TO INFORMATION SECURITY To make sound decisions about information security, create policies, and enforce them, management must be informed of the various kinds of threats facing the organization, its applications, data and information systems. A threat is an object, person, or other entity that represents a constant danger to an asset. To better understand the numerous threats facing the organization, a categorization scheme has been developed allowing us to group threats by their respective activities. By examining each threat category in turn, management can most effectively protect its information through policy, education and training, and technology controls.

    4. Principles of Information Security, 2nd Edition 4 Threats (continued) The 2004 Computer Security Institute (CSI)/Federal Bureau of Investigation (FBI) survey found: 79 percent of organizations reported cyber security breaches within the last 12 months 54 percent of those organizations reported financial losses totaling over $141 million THREATS TO INFORMATION SECURITY The 2002 Computer Security Institute/Federal Bureau of Investigation (CSI/FBI) survey on Computer Crime and Security Survey found: 90% of organizations responding, primarily large corporations and government agencies, detected computer security breaches within the last year. 80% of these organizations lost money to computer breaches, totaling over $455,848,000 up from $377,828,700 reported in 2001. The number of attacks that came across the Internet rose from 70% in 2001 to 74% in 2002. Only 34% of organizations reported their attacks to law enforcement. THREATS TO INFORMATION SECURITY The 2002 Computer Security Institute/Federal Bureau of Investigation (CSI/FBI) survey on Computer Crime and Security Survey found: 90% of organizations responding, primarily large corporations and government agencies, detected computer security breaches within the last year. 80% of these organizations lost money to computer breaches, totaling over $455,848,000 up from $377,828,700 reported in 2001. The number of attacks that came across the Internet rose from 70% in 2001 to 74% in 2002. Only 34% of organizations reported their attacks to law enforcement.

    5. Principles of Information Security, 2nd Edition 5 Threats to Information Security

More Related