B. NON TECHNICAL CYBER SECURITY THREATS TO INFORMATION SYSTEM
• Insider - An insider is known as someone with legitimate access to the network. Because information and data accessed by insiders can be easily copied, stolen, deleted, misfiled, or updated, insider threats can be some of the most damaging, harmful regardless of whether they occur due to user carelessness or do the malicious activity.
• Physical Security- Physical Security is significant to preventing unauthorized access to sensitive data, information as well as protecting an organization’s personnel and their resources. An effective and impacted physical security system is an integral part of a comprehensive security system. Physical safety measures consist
…show more content…
Socially engineered attacks are the means for some hackers to access codes and gain password, IP addresses, server and routers names, and other information that can be exploited to break into a network security and privacy.
• Insufficient Backup and Recovery- Lack of robust data and recovery solution puts an organization’s data at risk and undermines the effectiveness of its IT operations. Data and system recovery capabilities allow an organization to reduce the risk of damage associated with a data breach. It is essential to conduct routine backups of critical data and store backup media in a safe and secure manner.
• Poor Passwords- Implementing a policy on strong user passwords is critical to data protection. It is especially important for users with access to the most sensitive information. Modern password-cracking programs can easily break weak passwords, such as those containing common words or word groups found in a dictionary. For this reason, user-selected passwords are generally considered to be weaker than randomly-generated passwords. User-generated Page 5 of 8 passwords often follows a predictable pattern or association to something in the user’s life (city, family, or pet names for example) and are therefore more vulnerable to password-cracking programs. While randomly-generated passwords may be harder to remember, they are relatively more secure.
In the early days of computing, a hacker was primarily referred to as a computer guru, someone who is extremely technical with a high expertise in computer also known as “Expert Programmers”. Nevertheless, as technology is advancing at a face pace, hacking has adopted a completely different definition. The modern definition is someone who access a computer system primarily to steal or destroy information. Hacking has caused major harm in the realm of technology. Over the years, hackers have become much more lethal in their craft. They manage to break into complex information systems from entities such as banks, government agencies, and private businesses. Furthermore, they often manipulate their victims through social engineering in order to obtain financial benefits. Hackers hold different label such as: black hat hacker and white hat hacker in which all have their own motives.
(TCO 6) Many believe that the most important physical security control is _____. (Points : 5)
The Data recovery document should be refined to include the priority of data restoration when all business functions have been compromised
Developing backup procedures, implementing company-wide, recovery plans need to be developed and offsite backup locations should also be considered
A hacker attacks an easy target first, and then uses it to hide his identity and traces of launching attacks at more secured sites. The aim of an attack is to gain complete control of the system (in order to edit, delete, install or execute any file in any user’s directory), often by gaining access to a “ super-user” account. This will allow both maximum access and the ability to hide your presence.
Physical security – are generally intended to deter potential intruders 9 e.g. warning signs and perimeter markings); to detect intrusions and monitor / record intruders (e.g. intruder alarms and CCTV systems); to trigger appropriate incident responses (e.g. by security guards and police).
DTL Power Corporation is an electricity generating and distributing company headquartered in Santa Fe, New Mexico. Currently, they have 5.4 million electricity customers and 485,000 natural gas customers. Also, DTL Power has full or majority ownership of 14 nuclear reactors in 12 nuclear power plants. Additionally, it has 2 hydropower plants in the Midwest and 5 wind energy centers along the East Coast. Last year, incidents around the world involving nuclear reactors have led the company to increase security and safety regulations at its nuclear plants. Furthermore, the company is also researching additional environmentally friendly opportunities such as geothermal energy.
Any enterprise has to pay special attention to computer security. Computer security is a field that is concerned with the control of risks related to computer use. A primary focus should be on the external threats to the computing environment. In enterprise with branches cross country, it is important to allow information from "trusted" external sources, and disallow intrusion from anonymous or non-trusted sources. In a secure system, the authorized users of that system are still
CIO is well aware of the preventive measures taken against the external threats and has switched the focus to the internal threats. Detection and prevention of internal attack is equally important to the external attacks in the network. Most networks are vulnerable to betrayal from within do to the assumption that everyone who is inside the
Firstly, Disaster Recovery, this is a procedure that needs to be implemented in the case an accident occurs within an organisation that may result in the loss of data, for example fire/ water damage. This is when a plan needs to be applied to allow the recovery of data; an example of this could be recovering the backup files, installing new equipment and uploading the backup on the new network. For this to be effective this recovery policy relies on backups to be done regularly, otherwise recovery would not be eligible. The disaster recovery policy is highly beneficial and important as it saves not only the organisation but their money and reputation.
SE578 - Practices for Administration of Physical & Operations SecurityKeller Graduate School of ManagementPREPARED BY: PREPARED ON: APRIL 9, 2011
Every year companies experience a fire, earthquake or hurricane that obliterates company servers, and hence, destroys all company data as well. Hackers and viruses can also result in major data loses. Let the biggest data recovery disasters of 2015 serve as a warning that if you don't have a backup plan for your data, your company could land in hot water. As a business owner, you work hard to put food on the table, so why leave a security hole open? Around 70 percent of businesses that experience a data loss will go out of business within the first year.
Social engineering also known as people hacking is the art of utilizing human behavior to breach security without the victim even realizing that they have been manipulated. Social engineering can be further broken down to three methodologies.
Companies can prevent falling victim to unauthorized physical access by developing and implementing simple policies, standards, procedures, and guidelines for employees as well as guests to follow. Secure all areas containing sensitive systems and/or data. Require staff to follow entrance procedures when entering a secured area. Also ensure that physical data such as important documents are secured. Require
The worse attack on the United States computer network took place in 2008. The Deputy of Secretary of Defense, William J. Lynn III, described the event as a “network administrator’s worst fear: a rouge program operating silently, poised to deliver operational plans into the hands of an unknown adversary” (Lynn, 2010). The common thought that comes to mind when we think of an attack on a network infrastructure is that the attack is a complex attack coordinated by some “black hat ” hacker/cracker that had to decipher lines of code and encrypted algorithm to penetrate the United States network infrastructure. However, the most common attack and the most devastating attack to infect the United States network was a simple social engineering attack.