Page 22 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 22

Information Security and Privacy




                    Notes          The invalid access to the host can be prevented to a certain extent in case of conventional host to
                                   terminal as there is number of terminals connected is limited. The situation is entirely different
                                   in case of Internet where Internet allows access from any terminal connecting on a network.
                                   Therefore this requires  proper security measures. In this unit,  we will  discuss   some of  the
                                   threats happening frequently in the network.

                                   2.1 New Technologies Open Door Threats

                                   For modern period companies, particularly those occupied in electronic business, it is increasingly
                                   imperative to be  conscious of the online threats since more and  more people  are using the
                                   internet to obtain information concerning their business partners, customers, and other business
                                   associated links. Nowadays, almost all  business organizations have IS that use incorporated
                                   technologies like the networks of computers, company intranets or internet access to converse
                                   and broadcast information for quick business decisions, thus opening the organization to the
                                   outside world like never before. Under the situations, threats from outside the organization
                                   must be  addressed, since  the damages  from non-secured  information system  can effect in
                                   disastrous consequences for the organization.

                                       !

                                     Caution Organizations must examine and estimate the aspect that could be a threat to the
                                     reliability of the information system.

                                   Self Assessment

                                   Fill in the blanks:
                                   1.  Any kind of policy, procedure, or action that recognizes, minimizes, or eliminates a threat
                                       or risk is called a ............................. .
                                   2.  Any kind of asset that is not working optimally and is mission-critical or essential to the
                                       organization, such as data that are not backed-up, is called a ............................. .
                                   3.  Nowadays almost all business organizations have IS that use incorporated technologies
                                       like the networks of  computers, company intranets or internet access  to converse and
                                       broadcast information, thus opening the organization to the ............................. world like
                                       never before.

                                   2.2 Level of Threats Information Level and Network Level Threats


                                   It is  significant to  differentiate ‘information-level  threats’  from ‘network-level threats’.  By
                                   network-based threats we signify that to be effective, latent attackers need network access to
                                   corporate computer systems or to networks accessed by corporate computer systems.


                                          Example: For network dependent threats are hacking of computer systems and initiating
                                   of DoS attacks in addition to spreading malicious code, like viruses.
                                   Other security concerns included when data are broadcasted over networks are confidentiality,
                                   authentication, integrity, and non-repudiation.
                                   Information-level threats also make important utilization of network but at the key level is the
                                   content of a message and not its form. Transferring false inquiries to service accounts to eat up
                                   resources would qualify as an information-based attack. It is the content of the messages that
                                   would offer a foundation for the attack.




          16                                LOVELY PROFESSIONAL UNIVERSITY
   17   18   19   20   21   22   23   24   25   26   27