SlideShare una empresa de Scribd logo
1 de 23
SECURITY ANDSECURITY AND
ETHICAL CHALLENGESETHICAL CHALLENGES
OF INFORMATIONOF INFORMATION
TECHNOLOGYTECHNOLOGY
Presented by:-Presented by:-
Anjali sharmaAnjali sharma
Khushboo ghanshaniKhushboo ghanshani
IT SECURITY & ETHICS
The use of IT in business has had major
impacts on society & thus raises ethical
issues ion the area of crime , privacy,
individuality, employment, health & working
conditions.
Hence IT has both negative & positive
impacts.
So the responsibility of a business
professional is to manage the high quality
products & maintaining it.
EthicalEthical Responsibility
Security
Ethics and
Society
Employment Privacy
Health Crime
Working
Conditions
Individuality
Need for Security
1. Reduce the risk of systems and
organizations ceasing operations.
2. Maintaining information confidentiality.
3. Ensure the integrity and reliability of
data resources.
4. Ensure the uninterrupted availability of
data resources and online operations.
5. Ensure compliance with policies & laws
regarding security & privacy.
SecuritySecurity
ManagementManagement
Goal of SecurityGoal of Security
ManagementManagement
– Minimize errors, fraud, and losses in the
e-business systems that interconnect
businesses with their customers,
suppliers, and other stakeholders
Security Measures
Encryption
Denial of Service
Defenses
Fire Walls
Monitor
E-mail
Virus
Defenses
Security Measures (cont..)
Security
Codes
Security
Monitors
Backup
Files
Biometric
Security Controls
Encryption
– Passwords, messages, files, and other
data is transmitted in scrambled form
and unscrambled for authorized users
– Involves using special mathematical
algorithms to transform digital data in
scrambled code
– Most widely used method uses a pair of
public and private keys unique to each
individual
Types of Encryption
Secret Key Algorithm , (symmetric
encryption):
Symmetric or private key, encryption is
based on a secret key that is shared by
both communicating parties. The sending
party uses the secret key as part of the
mathematical operation to encipher plain
text to cipher text. The receiving party
uses the same secret key to decipher the
cipher text to plain text.
Types of encrption
(contd..)
Public Key Algorithm (Asymmetric
Encryption):
It uses two different keys for each user;
one is private key known only to this one
user, the other is corresponding public
key, which is accessible to anyone. The
private & public keys are mathematically
related by the encryption algorithm. One
key is used for encryption and the other
for decryption, depending on the nature of
the communication service.
Firewalls
Serves as a
“gatekeeper”
system that
protects a company’s
intranets and other
computer networks
from intrusion
 Provides a filter and
safe transfer point
 Screens all network
traffic for proper
passwords or other
security codes
Advantages of Firewalls
Provides security to both inbound &
outbound traffic.
Response time is very high in case of
high end firewalls.
Software firewalls are usually
cheaper and preferred for individual
computers where as hardware
firewalls are for organizations and
are costly.
Disadvantages of
Firewalls
• Firewalls cannot protect the system
from insider attacks.
• Installation & maintenance costs
often become an overhead.
• Users surfing capabilities are
reduced.
• If the firewall is configured with
stringent rules, it constantly annoys
user with False positives.
Denial of Service
Defenses
 These assaults depend on
three layers of networked
computer systems
 Victim’s website
 Victim’s ISP
 Sites of “zombie” or slave
computers
 Defensive measures and
security precautions must be
taken at all three levels
Security Measures (cont..)
• E-mail Monitoring
“Spot checks just aren’t good enough anymore.
The tide is turning toward systematic
monitoring of corporate e-mail traffic using
content-monitoring software that scans for
troublesome words that might compromise
corporate security.”
• Virus Defenses
Protection may accomplished through
Centralized distribution and updating of antivirus
software
Outsourcing the virus protection responsibility to
ISPs or to telecommunications or security
management companies
Security Measures (cont..)
Security codes
Multilevel password system:-
Log onto the computer system, Gain
access into the system, Access
individual files
Backup Files
Duplicate files of data or programs
File retention measures
Sometimes several generations of files
are kept for control purposes
CYBER TERRORISM
• Cyber terrorism is the
convergence of terrorism
and cyberspace. It is
generally understood to
mean unlawful attacks
and threats of attack
against computers,
networks, and the
information stored
therein when done to
intimidate or coerce a
government or its people
in furtherance of
political or social
objectives.
Cyber Terrorism
Basic facts about cyber
terrorism
• Cyber attacks immediately follow
physical attacks
• Cyber attacks are increasing in
volume, sophistication, and
coordination
• Cyber attackers are attracted to
high-value targets
• Many, if not most, targets would
probably be commercial computer and
communications systems
What can we do..???
Go on the defensive now
– Educate senior management on risks of cyber
warfare
– Make infosec a top priority
– Beef up your security technology
– Insist on flawless execution: compliance to
security standards in all areas
Work with other companies, government
agencies
– NIPC
– IT ISAC
– SAINT
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02

Más contenido relacionado

La actualidad más candente

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
paramalways
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 
Information security threats
Information security threatsInformation security threats
Information security threats
complianceonline123
 

La actualidad más candente (20)

Security in it
Security in it Security in it
Security in it
 
An Introduction to Cyber security
An Introduction to Cyber securityAn Introduction to Cyber security
An Introduction to Cyber security
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
Cia security model
Cia security modelCia security model
Cia security model
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
Information security
Information securityInformation security
Information security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Information security
Information securityInformation security
Information security
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Information security
Information securityInformation security
Information security
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 

Destacado (15)

Chris Brown - F.A.M.E Digipack Analysis
Chris Brown - F.A.M.E Digipack AnalysisChris Brown - F.A.M.E Digipack Analysis
Chris Brown - F.A.M.E Digipack Analysis
 
Production Diary
Production DiaryProduction Diary
Production Diary
 
Magazine research
Magazine researchMagazine research
Magazine research
 
Magazine analysis
Magazine analysisMagazine analysis
Magazine analysis
 
Falicitation
FalicitationFalicitation
Falicitation
 
How did you use media technologies in the construction and research, planning...
How did you use media technologies in the construction and research, planning...How did you use media technologies in the construction and research, planning...
How did you use media technologies in the construction and research, planning...
 
Question 2
Question 2Question 2
Question 2
 
Band images
Band imagesBand images
Band images
 
Magazine Poster Analysis
Magazine Poster AnalysisMagazine Poster Analysis
Magazine Poster Analysis
 
Martin Garrix & Jay Hardway - Wizard Analysis
Martin Garrix & Jay Hardway - Wizard AnalysisMartin Garrix & Jay Hardway - Wizard Analysis
Martin Garrix & Jay Hardway - Wizard Analysis
 
121214 アド部発表資料 2012年TOP NEWS
121214 アド部発表資料 2012年TOP NEWS121214 アド部発表資料 2012年TOP NEWS
121214 アド部発表資料 2012年TOP NEWS
 
Skepta & JME - Thats Not Me Analysis
Skepta & JME - Thats Not Me AnalysisSkepta & JME - Thats Not Me Analysis
Skepta & JME - Thats Not Me Analysis
 
Pengenalan sains sukan
Pengenalan sains sukanPengenalan sains sukan
Pengenalan sains sukan
 
20110224024435617
2011022402443561720110224024435617
20110224024435617
 
DASAR BRITISH DAN KESANNYA TERHADAP EKONOMI NEGARA.
DASAR BRITISH DAN KESANNYA TERHADAP EKONOMI NEGARA.DASAR BRITISH DAN KESANNYA TERHADAP EKONOMI NEGARA.
DASAR BRITISH DAN KESANNYA TERHADAP EKONOMI NEGARA.
 

Similar a Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02

Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
isidro luna beltran
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
madunix
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
IJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
IJERA Editor
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdf
publicchats
 

Similar a Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02 (20)

ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
I0516064
I0516064I0516064
I0516064
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Unit v
Unit vUnit v
Unit v
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdf
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02

  • 1. SECURITY ANDSECURITY AND ETHICAL CHALLENGESETHICAL CHALLENGES OF INFORMATIONOF INFORMATION TECHNOLOGYTECHNOLOGY
  • 2. Presented by:-Presented by:- Anjali sharmaAnjali sharma Khushboo ghanshaniKhushboo ghanshani
  • 3. IT SECURITY & ETHICS The use of IT in business has had major impacts on society & thus raises ethical issues ion the area of crime , privacy, individuality, employment, health & working conditions. Hence IT has both negative & positive impacts. So the responsibility of a business professional is to manage the high quality products & maintaining it.
  • 4. EthicalEthical Responsibility Security Ethics and Society Employment Privacy Health Crime Working Conditions Individuality
  • 5. Need for Security 1. Reduce the risk of systems and organizations ceasing operations. 2. Maintaining information confidentiality. 3. Ensure the integrity and reliability of data resources. 4. Ensure the uninterrupted availability of data resources and online operations. 5. Ensure compliance with policies & laws regarding security & privacy.
  • 7. Goal of SecurityGoal of Security ManagementManagement – Minimize errors, fraud, and losses in the e-business systems that interconnect businesses with their customers, suppliers, and other stakeholders
  • 8. Security Measures Encryption Denial of Service Defenses Fire Walls Monitor E-mail Virus Defenses
  • 10. Encryption – Passwords, messages, files, and other data is transmitted in scrambled form and unscrambled for authorized users – Involves using special mathematical algorithms to transform digital data in scrambled code – Most widely used method uses a pair of public and private keys unique to each individual
  • 11. Types of Encryption Secret Key Algorithm , (symmetric encryption): Symmetric or private key, encryption is based on a secret key that is shared by both communicating parties. The sending party uses the secret key as part of the mathematical operation to encipher plain text to cipher text. The receiving party uses the same secret key to decipher the cipher text to plain text.
  • 12. Types of encrption (contd..) Public Key Algorithm (Asymmetric Encryption): It uses two different keys for each user; one is private key known only to this one user, the other is corresponding public key, which is accessible to anyone. The private & public keys are mathematically related by the encryption algorithm. One key is used for encryption and the other for decryption, depending on the nature of the communication service.
  • 13. Firewalls Serves as a “gatekeeper” system that protects a company’s intranets and other computer networks from intrusion  Provides a filter and safe transfer point  Screens all network traffic for proper passwords or other security codes
  • 14. Advantages of Firewalls Provides security to both inbound & outbound traffic. Response time is very high in case of high end firewalls. Software firewalls are usually cheaper and preferred for individual computers where as hardware firewalls are for organizations and are costly.
  • 15. Disadvantages of Firewalls • Firewalls cannot protect the system from insider attacks. • Installation & maintenance costs often become an overhead. • Users surfing capabilities are reduced. • If the firewall is configured with stringent rules, it constantly annoys user with False positives.
  • 16. Denial of Service Defenses  These assaults depend on three layers of networked computer systems  Victim’s website  Victim’s ISP  Sites of “zombie” or slave computers  Defensive measures and security precautions must be taken at all three levels
  • 17. Security Measures (cont..) • E-mail Monitoring “Spot checks just aren’t good enough anymore. The tide is turning toward systematic monitoring of corporate e-mail traffic using content-monitoring software that scans for troublesome words that might compromise corporate security.” • Virus Defenses Protection may accomplished through Centralized distribution and updating of antivirus software Outsourcing the virus protection responsibility to ISPs or to telecommunications or security management companies
  • 18. Security Measures (cont..) Security codes Multilevel password system:- Log onto the computer system, Gain access into the system, Access individual files Backup Files Duplicate files of data or programs File retention measures Sometimes several generations of files are kept for control purposes
  • 19. CYBER TERRORISM • Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
  • 21. Basic facts about cyber terrorism • Cyber attacks immediately follow physical attacks • Cyber attacks are increasing in volume, sophistication, and coordination • Cyber attackers are attracted to high-value targets • Many, if not most, targets would probably be commercial computer and communications systems
  • 22. What can we do..??? Go on the defensive now – Educate senior management on risks of cyber warfare – Make infosec a top priority – Beef up your security technology – Insist on flawless execution: compliance to security standards in all areas Work with other companies, government agencies – NIPC – IT ISAC – SAINT