Chapter 7
Securing Information System
Chapter 7
Securing Information System
How to minimize threats when you are owning a business that allow customers to use online payment using credit cards?
Who poses the biggest security threat:
insiders or outsiders?
Insiders threat
Outsiders threat
It comes from users with an authorization to organization network, application and databases.
Do you think security is one of business issues instead of technology issues? Or it can be both?
Yes, security is one of the business issues
instead of technology issues.
Comprising well-funded intruders and hackers, organized cybercrime groups, and government entities, Outsider Threats pose no less serious menace to the organization’s data.
Authentication can be used in five ways:
1) Passwords - Only to authorized users by using passwords to log on to a computer systems and can also use it for accessing specific systems and files.
2) Token - Tokenization will remove data from a system and replace it with an associated value.
3) Smart Card - A device about the size of a credit card which contains a chip formatted with access permission and other data and it also used in electronic payment systems which can interpret data in the chip and allows or denies access.
4) Biometric authentication - A security method that relies on an individual's unique biological traits to verify that they are who they pretend to be.
5) Two-factor authentication - Before anything being secured may be accessed, it requires two forms of information from the user like a password or personal identification number (PIN), a code given to the user's smartphone or fingerprint.
Compromised actors
Insiders with access credentials.
Unintentional actors
Insiders who expose data
accidentally.
Emotional attackers
Insiders who steal data or
destroy
company networks intentionally.
Tech savvy actors
Authentication
Insiders who use their knowledge
of weaknesses and vulnerabilities
to breach clearance
and
access sensitive information.
GROUP MEMBERS
1) Muhammad Azim bin Ibrahim (2021864968)
2) Muhammad Faiz bin Ismail (2021888642)
3) Nasruddin bin Nohhani (2021474102)
4) Saiful Hakim bin Rosli (2021619928)
Software vulnerability
System failed that can lead to
significant
loss in business activities.
Security vulnerabilities
Hidden bugs, flaws can
open the network to intruders
Cyber espionage
Cyber attack that steals
classified, sensitive data
or intellectual property to gain
an advantage over a competitive
company or government entity.
Cyber Warfare
Series of attacks that
target a country.
63 percent of organization says INSIDER THREATS pose the biggest risk, it is because only insider have access to sensitive data, Most data breaches result come from employee error that give an outsiders an opportunity (Shanon, 2022).