SlideShare a Scribd company logo
1 of 9
Information security means that the confidentiality,
integrity and availability of information assets is
maintained.
 Confidentiality: This means that information is only
used by people who are authorized to access it.
 Integrity: It ensures that information remains intact
and unaltered. Any changes to the information through
malicious action, natural disaster, or even a simple
innocent mistake are tracked.
 Availability: This means that the information is
accessible when authorized users need it.
Most common types of information security threats are:
 Theft of confidential information by hacking
 System sabotage by hackers
 Phishing and other social engineering attacks
 Virus, spyware and malware
 Social Media-the fraud threat
One of the major threat to information security is the theft of
confidential data by hacking. This includes theft of employee
information or theft of trade secrets and other intellectual
property (IP).
Theft of Employee Information
 Employee information includes credit card information, corporate credit card information,
social security number , address, etc. It also includes theft of healthcare records as they
contain personal information such date of birth, address, and name of relatives.
Theft of Trade Secrets and other Intellectual Property (IP)
 Technology from various verticals including IT, aerospace, and telecommunications are
constantly stolen by outsiders or insiders (industrial espionage). China is a growing offender
as it continues to advance in technology relying on theft of international trade secrets and IP.
 Piracy/copyright infringement.
 Corporate business strategies including marketing strategies, product introduction
strategies.
What is system sabotage?
Planting malware on networks of target organization and generating
an enormous amount of transaction activity resulting in malfunction or
crash of the system.
Who would perpetrate it?
 System sabotage is usually committed by disgruntled ex-employees
and by remote cyber-attackers for no particular reason.
 The most sensational case of system sabotage: One of the recent
examples is the sabotage of Sony PlayStation.
 To obtain confidential data about individuals-customers, clients,
employees or vendors that can be used to commit various types
of identity fraud such as:
◦ Opening bank accounts in victim’s name
◦ Applying for loans in victim’s name
◦ Applying for credit cards in victim’s name
◦ Obtaining medical services in victims name (e-death)
 Other kind of more sophisticated social engineering attacks
include spear-phishing.
 Spear-phishing targets specific individuals such as AP manger,
controller, senior accountant to gain access to corporate bank
accounts and transfer funds abroad.
Other threats include:
 Smishing: Phishing via SMS (texting)
 Vishing: Phishing via voice (phone)
 Mobile hacking: Intercepting messages between cell
phone/smart phones and stealing data
Virus and Spyware
 Virus: A computer virus is a malicious software or code that
can replicate itself and spread to other computers and can
damage a computer by deleting files, reformatting the hard
disk etc.
 Spyware: It is software that secretly tracks information such
websites visited, browser and system information, and
computer IP address and transmits the data gathered to the
another system.
Impersonation is one of the social engineering tools used
by fraudsters to commit identity theft. Following are best
practices to protect organizations from social engineering
attacks:
 Broaden company’s online reputation. Blogging is the best.
 As part of online reputation management, optimize your company’s
listings in search engines like Google (search engine optimization).
 If a company identifies themselves using your organization’s photo
or bio in social media, be very persistent in contacting their site
administrators. They too have reputations to manage and they will
often delete stolen profiles as this constitutes to fraud.
 Enlist services such as Mark Monitor or other brand protection and
trademark management firms.
Want to learn more about information security, its
requirements and best practices to comply with them?
ComplianceOnline webinars and seminars are a great
training resource. Check out the following links:
 Information Security and Cybercrime
Prevention Essentials
 How to Manage Ongoing Information Security
Requirements?
 How to Evaluate Effectiveness of Your
Information Security Program?
 Auditing Your Information Security Program.
 Third Party Information Security Assessment.

More Related Content

What's hot

Information security management
Information security managementInformation security management
Information security management
UMaine
 
Information security management system
Information security management systemInformation security management system
Information security management system
Arani Srinivasan
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
elihuwalker
 

What's hot (20)

Information security
Information securityInformation security
Information security
 
Information security management
Information security managementInformation security management
Information security management
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Operating system security
Operating system securityOperating system security
Operating system security
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
Information security
Information securityInformation security
Information security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Information Security
Information SecurityInformation Security
Information Security
 

Viewers also liked

The Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On IndustryThe Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On Industry
lilian91
 
What is your Intellectual Property Worth? Methods for Determining Value
What is your Intellectual Property Worth? Methods for Determining ValueWhat is your Intellectual Property Worth? Methods for Determining Value
What is your Intellectual Property Worth? Methods for Determining Value
CONSOR Intellectual Asset Management
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk management
MetricStream Inc
 

Viewers also liked (16)

Diesel theft detection-fuel pilferage prevention-generator-case study-5
Diesel theft detection-fuel pilferage prevention-generator-case study-5Diesel theft detection-fuel pilferage prevention-generator-case study-5
Diesel theft detection-fuel pilferage prevention-generator-case study-5
 
Fleet Fuel Management: Analysis and Reporting
Fleet Fuel Management: Analysis and ReportingFleet Fuel Management: Analysis and Reporting
Fleet Fuel Management: Analysis and Reporting
 
Information Security for Enterprise
Information Security for EnterpriseInformation Security for Enterprise
Information Security for Enterprise
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Managing the Cyberthreat Landscape
Managing the Cyberthreat LandscapeManaging the Cyberthreat Landscape
Managing the Cyberthreat Landscape
 
How to commit corporate espionage (10 Card Deck)
How to commit corporate espionage (10 Card Deck)How to commit corporate espionage (10 Card Deck)
How to commit corporate espionage (10 Card Deck)
 
Corporate espionage
Corporate espionageCorporate espionage
Corporate espionage
 
Présentation - atelier War Room
Présentation - atelier War RoomPrésentation - atelier War Room
Présentation - atelier War Room
 
The Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On IndustryThe Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On Industry
 
What is your Intellectual Property Worth? Methods for Determining Value
What is your Intellectual Property Worth? Methods for Determining ValueWhat is your Intellectual Property Worth? Methods for Determining Value
What is your Intellectual Property Worth? Methods for Determining Value
 
The value proposition of advanced telematics
The value proposition of advanced telematicsThe value proposition of advanced telematics
The value proposition of advanced telematics
 
Employee volunteering opportunities at aid for change
Employee volunteering opportunities at aid for changeEmployee volunteering opportunities at aid for change
Employee volunteering opportunities at aid for change
 
Xoriant - Financial services expertise
Xoriant - Financial services expertiseXoriant - Financial services expertise
Xoriant - Financial services expertise
 
Health insurance compliance
Health insurance complianceHealth insurance compliance
Health insurance compliance
 
ComplianceOnline Virtual Seminar - IFRS and Effective Fraud Prevention Strate...
ComplianceOnline Virtual Seminar - IFRS and Effective Fraud Prevention Strate...ComplianceOnline Virtual Seminar - IFRS and Effective Fraud Prevention Strate...
ComplianceOnline Virtual Seminar - IFRS and Effective Fraud Prevention Strate...
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk management
 

Similar to Information security threats

How to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdfHow to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdf
rohit219406
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docx
Mohsin Abbas
 

Similar to Information security threats (20)

Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
How to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdfHow to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdf
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docx
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Task 3
Task 3Task 3
Task 3
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Stay safe online- understanding authentication methods
Stay safe online- understanding authentication methodsStay safe online- understanding authentication methods
Stay safe online- understanding authentication methods
 
Facts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf SecurityFacts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf Security
 
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdfIs It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Information security
Information securityInformation security
Information security
 
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health CareUnderstanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 

More from complianceonline123

Sec what you need to know
Sec what you need to knowSec what you need to know
Sec what you need to know
complianceonline123
 
Auditing your grc programs
Auditing your grc programsAuditing your grc programs
Auditing your grc programs
complianceonline123
 
Workplace harrasment
Workplace harrasmentWorkplace harrasment
Workplace harrasment
complianceonline123
 

More from complianceonline123 (20)

Fda adverse event reporting requirements for otc drugs
Fda adverse event reporting requirements  for otc drugsFda adverse event reporting requirements  for otc drugs
Fda adverse event reporting requirements for otc drugs
 
Social media risks rules policies procedures
Social media risks rules policies  proceduresSocial media risks rules policies  procedures
Social media risks rules policies procedures
 
Fmla ada overlap
Fmla  ada  overlapFmla  ada  overlap
Fmla ada overlap
 
Hipaa enforcement examples
Hipaa enforcement examplesHipaa enforcement examples
Hipaa enforcement examples
 
Excel spreadsheets how to ensure 21 cfr part 11 compliance
Excel spreadsheets  how to ensure 21 cfr part 11 complianceExcel spreadsheets  how to ensure 21 cfr part 11 compliance
Excel spreadsheets how to ensure 21 cfr part 11 compliance
 
Retail loss
Retail lossRetail loss
Retail loss
 
Hipaa privacy rule
Hipaa privacy ruleHipaa privacy rule
Hipaa privacy rule
 
Fda warning letters
Fda  warning lettersFda  warning letters
Fda warning letters
 
Dietary supplement
Dietary supplementDietary supplement
Dietary supplement
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
 
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potential
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s PotentialReaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potential
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potential
 
Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit
 
Basics of internal audit
Basics of internal auditBasics of internal audit
Basics of internal audit
 
Free trade zones
Free trade zonesFree trade zones
Free trade zones
 
Sec what you need to know
Sec what you need to knowSec what you need to know
Sec what you need to know
 
Auditing your grc programs
Auditing your grc programsAuditing your grc programs
Auditing your grc programs
 
Aml non bank finanacial institutions
Aml non bank finanacial institutionsAml non bank finanacial institutions
Aml non bank finanacial institutions
 
Gdp how to manage documentation lifecycle
Gdp  how to manage documentation lifecycleGdp  how to manage documentation lifecycle
Gdp how to manage documentation lifecycle
 
Workplace harrasment
Workplace harrasmentWorkplace harrasment
Workplace harrasment
 
Good documentation practices
Good documentation practicesGood documentation practices
Good documentation practices
 

Recently uploaded

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
dlhescort
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 

Recently uploaded (20)

Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 

Information security threats

  • 1.
  • 2. Information security means that the confidentiality, integrity and availability of information assets is maintained.  Confidentiality: This means that information is only used by people who are authorized to access it.  Integrity: It ensures that information remains intact and unaltered. Any changes to the information through malicious action, natural disaster, or even a simple innocent mistake are tracked.  Availability: This means that the information is accessible when authorized users need it.
  • 3. Most common types of information security threats are:  Theft of confidential information by hacking  System sabotage by hackers  Phishing and other social engineering attacks  Virus, spyware and malware  Social Media-the fraud threat
  • 4. One of the major threat to information security is the theft of confidential data by hacking. This includes theft of employee information or theft of trade secrets and other intellectual property (IP). Theft of Employee Information  Employee information includes credit card information, corporate credit card information, social security number , address, etc. It also includes theft of healthcare records as they contain personal information such date of birth, address, and name of relatives. Theft of Trade Secrets and other Intellectual Property (IP)  Technology from various verticals including IT, aerospace, and telecommunications are constantly stolen by outsiders or insiders (industrial espionage). China is a growing offender as it continues to advance in technology relying on theft of international trade secrets and IP.  Piracy/copyright infringement.  Corporate business strategies including marketing strategies, product introduction strategies.
  • 5. What is system sabotage? Planting malware on networks of target organization and generating an enormous amount of transaction activity resulting in malfunction or crash of the system. Who would perpetrate it?  System sabotage is usually committed by disgruntled ex-employees and by remote cyber-attackers for no particular reason.  The most sensational case of system sabotage: One of the recent examples is the sabotage of Sony PlayStation.
  • 6.  To obtain confidential data about individuals-customers, clients, employees or vendors that can be used to commit various types of identity fraud such as: ◦ Opening bank accounts in victim’s name ◦ Applying for loans in victim’s name ◦ Applying for credit cards in victim’s name ◦ Obtaining medical services in victims name (e-death)  Other kind of more sophisticated social engineering attacks include spear-phishing.  Spear-phishing targets specific individuals such as AP manger, controller, senior accountant to gain access to corporate bank accounts and transfer funds abroad.
  • 7. Other threats include:  Smishing: Phishing via SMS (texting)  Vishing: Phishing via voice (phone)  Mobile hacking: Intercepting messages between cell phone/smart phones and stealing data Virus and Spyware  Virus: A computer virus is a malicious software or code that can replicate itself and spread to other computers and can damage a computer by deleting files, reformatting the hard disk etc.  Spyware: It is software that secretly tracks information such websites visited, browser and system information, and computer IP address and transmits the data gathered to the another system.
  • 8. Impersonation is one of the social engineering tools used by fraudsters to commit identity theft. Following are best practices to protect organizations from social engineering attacks:  Broaden company’s online reputation. Blogging is the best.  As part of online reputation management, optimize your company’s listings in search engines like Google (search engine optimization).  If a company identifies themselves using your organization’s photo or bio in social media, be very persistent in contacting their site administrators. They too have reputations to manage and they will often delete stolen profiles as this constitutes to fraud.  Enlist services such as Mark Monitor or other brand protection and trademark management firms.
  • 9. Want to learn more about information security, its requirements and best practices to comply with them? ComplianceOnline webinars and seminars are a great training resource. Check out the following links:  Information Security and Cybercrime Prevention Essentials  How to Manage Ongoing Information Security Requirements?  How to Evaluate Effectiveness of Your Information Security Program?  Auditing Your Information Security Program.  Third Party Information Security Assessment.