110 likes | 231 Vues
The modern business environment is marked by interconnected networks and widespread device usage, which heightens the risk of information security threats. Factors such as smaller, cheaper technology, the diminishing skill barrier for hackers, and increased employee use of unmanaged devices aggravate vulnerabilities. Unintentional threats, including natural disasters and human error, coupled with deliberate threats like espionage and software attacks, pose significant challenges. Effective risk management strategies, including risk mitigation, physical and access controls, and communication controls, are essential for protecting information security.
E N D
CHAPTER 4 Information Security
Factors Increasing the Threats to Information Security • Today’s interconnected, interdependent, wirelessly-networked business environment • Smaller, faster, cheaper computers and storage devices • Decreasing skills necessary to be a computer hacker • Increased employee use of unmanaged devices • Lack of management support
Unintentional Threats • Unintentional acts • Natural disasters • Technical failures / environmental hazards • Human error • Social Engineering (tailgating, shoulder surfing, etc.) • Management failures • Ways to prevent?
Deliberate Threats • Espionage / Trespassing • Extortion • Sabotage / vandalism • Theft (equipment, information, or identity) • Software attacks • Many others
Risk Management • Risk • Risk management • Risk analysis • Risk mitigation
Risk Mitigation Strategies • Risk acceptance • Risk limitation • Risk transference
Information Security Controls • Physical Controls • Access Controls • Communications Controls
Access Controls • Authentication • Something the user is • Something the user has • Something the user does • Something the user knows • Authorization
Communications Controls • Firewalls • Antivirus software • Whitelisting and Blacklisting software • Encryption • Digital Certificates • VPN • Employee Monitoring Systems
Other things organizations can do... • Business Continuity Planning • Backup • Recovery • Information Security Auditing