100 likes | 222 Vues
Information is a vital asset for any company, serving as both raw material and capital for products. However, it is constantly under threat from various sources, including component failure, negligence, and cybercriminals—ranging from white-hat hackers, who aim to improve security, to black-hat hackers and crackers, who seek to exploit vulnerabilities for gain. To counter these risks, businesses should implement robust security plans involving risk management, regular assessments, safeguards like backups and firewalls, and a comprehensive disaster recovery plan. An effective strategy is crucial in a landscape rife with cyber crimes.
E N D
8 Protecting Information
Information Has 2 Roles • raw material • part of a company’s product • capital • used to provide all products
Protecting Information • Information is threatened by • component failure • carelessness • deliberate attacks
Hackers • white-hat hackers • break in, don’t do damage • black-hat hackers • break in, cause trouble • crackers • break in for monetary gain • script bunnies • use software created by others
Most Common Types of Cyber Crime • virus: destructive software • macro virus attaches to application • worm spreads easily • denial-of-service • many e-businesses hit • can be disastrous
Security Plan • risk management • identification of risks or threats • implementation of security measures • monitoring plan for effectiveness
Risk Assessment • evaluate IT assets • what can go wrong? • how likely is it? • what are the consequences?
Safeguards • backups - ALWAYS • firewalls • encryption • security software
Disaster Recovery Plan • a plan of what you’ll do if disaster strikes • include consideration of • customers • facilities • knowledge workers • business information • computer equipment • communications infrastructure
Summary • many types of cyber crimes are perpetrated all over the world • organizations should have and use an effective security plan