Lecture2 Need For Security
Lecture2 Need For Security
Lecture2 Need For Security
Sixth Edition
Chapter 2
Need for Security
Learning Objectives
Data: Items of fact collected by an organization. Data includes raw numbers, facts, and words. Student
quiz scores are a simple example of data
Information: Data that has been organized, structured, and presented to provide additional insight
into its context, worth, and usefulness. For example, a student class average can be presented in the
context of its value, as in “ 90=A”
Information asset: The focus of information security; is information that has value to the organization,
and the systems that store, process, and transmit the information.
Media: As a subset of information assets, the systems and networks that store, process, and transmit
information.
Internet usage and world population estimates are as of July 20, 2020
Statistics of threats and attacks to information security.
• Several studies in recent years have examined the threats and attacks to
information security. One of the most recent studies found that 67.1 percent of
responding organizations suffered malware infections.
• More than 98 percent of responding organizations identified malware attacks as a
threat, with 58.7 percent indicating they were a significant or severe threat.
• Malware was identified as the second-highest threat source behind electronic
phishing/spoofing.
IP is protected by copyright law and other laws- requires the acquisition of permission
for its use, as specified in those law.
• Information system depends on the successful operation of many interdependent support systems.
• Internet service, communications, and power irregularities dramatically affect the availability of
information and systems.
• availability disruption: An interruption in service, usually from a service provider, which causes
an adverse event within an organization.
• Internet service issues:
– Internet service provider (ISP): failures can considerably undermine the availability of
information.
– Outsourced Web hosting provider assumes responsibility for all Internet services as well as for
the hardware and Web site operating system software.These Web hosting services are usually
arranged with a service level agreement (SLA).
• Virus :A type of malware that is attached to other executable programs. When activated, it
replicates and propagates itself to multiple systems, spreading by multiple communications
vectors. For example, a virus might send copies of itself to all users in the infected system’s e-mail
– macro virus :A type of virus written in a specific macro language to target applications that use the
language. The virus is activated when the application’s product is opened. A macro virus typically affects
documents, slideshows, e-mails, or spreadsheets created by office suite applications.
– memory-resident virus: are capable of reactivating when the computer is booted and continuing their
actions until the system is shut down
Failure to use cryptographically strong random numbers: Those who understand the workings of such
a random number generator can predict particular values at particular times.
Neglecting Change Control: Once the system is in production, change control processes ensure that
only authorized changes are introduced and that all changes are adequately tested before being
released
Unauthenticated key exchange: One of the biggest challenges in private key systems, which involve
two users sharing the same key, is securely getting the key to the other party.
Use of weak password-based systems: Failure to require sufficient password strength and to control
incorrect password entry is a serious security issue