Chapter 7


Securing Information System

How to minimize threats when you are owning a business that allow customers to use online payment using credit cards?

Who poses the biggest security threat:
insiders or outsiders?

Insiders threat

Outsiders threat

It comes from users with an authorization to organization network, application and databases.

Do you think security is one of business issues instead of technology issues? Or it can be both?

Yes, security is one of the business issues
instead of technology issues.

  • The business has many customers' data to be taken care of.
  • The business faces hackers and computer crime.
  • For example, spoofing, sniffing, harming, and phishing.
  • Hence, the customer's data could be exposed to hackers and threats.

Comprising well-funded intruders and hackers, organized cybercrime groups, and government entities, Outsider Threats pose no less serious menace to the organization’s data.

Authentication can be used in five ways:
1) Passwords - Only to authorized users by using passwords to log on to a computer systems and can also use it for accessing specific systems and files.
2) Token - Tokenization will remove data from a system and replace it with an associated value.
3) Smart Card - A device about the size of a credit card which contains a chip formatted with access permission and other data and it also used in electronic payment systems which can interpret data in the chip and allows or denies access.
4) Biometric authentication - A security method that relies on an individual's unique biological traits to verify that they are who they pretend to be.
5) Two-factor authentication - Before anything being secured may be accessed, it requires two forms of information from the user like a password or personal identification number (PIN), a code given to the user's smartphone or fingerprint.

Compromised actors

Insiders with access credentials.

Unintentional actors

Insiders who expose data
accidentally.

Emotional attackers

Insiders who steal data or
destroy
company networks intentionally.

Tech savvy actors

Authentication

Insiders who use their knowledge
of weaknesses and vulnerabilities
to breach clearance
and
access sensitive information.

GROUP MEMBERS
1) Muhammad Azim bin Ibrahim (2021864968)
2) Muhammad Faiz bin Ismail (2021888642)
3) Nasruddin bin Nohhani (2021474102)
4) Saiful Hakim bin Rosli (2021619928)

Software vulnerability

System failed that can lead to
significant
loss in business activities.

Security vulnerabilities

Hidden bugs, flaws can
open the network to intruders

  • Authentication is one of the technologies and tools for protecting information resources.
  • Authentication refers to the ability to know that a person is who he or she claims to be.
  • There are five ways to use authentication.

Cyber espionage

Cyber attack that steals
classified, sensitive data
or intellectual property to gain
an advantage over a competitive
company or government entity.

Cyber Warfare

Series of attacks that
target a country.

63 percent of organization says INSIDER THREATS pose the biggest risk, it is because only insider have access to sensitive data, Most data breaches result come from employee error that give an outsiders an opportunity (Shanon, 2022).