Chapter 5 - Protecting Information Resources
Chapter 5 - Protecting Information Resources
RESOURCES
Chapter 5
1
PROTECTING INFORMATION
RESOURCES
2
RISKS ASSOCIATED WITH
INFORMATION TECHNOLOGIES
In 2024, cybercrime cost companies globally $9.5 trillion, and it will exceed $10.5 trillion
in 2025.
3
THE COSTS OF CYBER CRIME TO
THE GLOBAL ECONOMY
4
SPYWARE AND ADWARE
5
SPYWARE AND ADWARE
6
PHISHING, PHARMING, BAITING,
QUID PRO QUO
7
PHISHING, PHARMING, BAITING,
QUID PRO QUO
8
9
PHISHING, PHARMING, BAITING,
QUID PRO QUO
Baiting is similar to phishing attacks, except for the promise that the
baiter gives to the recipient.
For example, after completing this form you will receive free software
or a gift card.
10
KEYSTROKE LOGGERS
11
SNIFFING AND SPOOFING
12
COMPUTER AND NETWORK
SECURITY
Availability means that computers and networks are operating, and authorized
users can access the information they need. It also means a quick recovery in
the event of a system failure or disaster.
13
INTENTIONAL THREATS
I Love You (2000) virus referred to as a love bug or a love letter. It infected over 10
million computers and it started spreading as an email message with the subject
I love you. In that message, there is an attachment sent in the email LOVE-
LETTER-FOR-YOU.txt.vbs. Many users consider the .vbs extension as a plain text
file. It catches many users’ attention and makes them open the attachment.
When the user opens the attachment the Visual Basic script gets activated and
damages the local machine.
14
INTENTIONAL THREATS
A logic bomb is a type of Trojan program used to release a virus, worm, or other
destructive code. Logic bombs are triggered at a certain time (sometimes the
birthday of a famous person) or by a specific event, such as a user pressing the
Enter key or running a certain program.
15
SOCIAL ENGINEERING
16
SOCIAL ENGINEERING
17
SECURITY MEASURES AND
ENFORCEMENT
18
SECURITY MEASURES AND
ENFORCEMENT
19
SECURITY MEASURES AND
ENFORCEMENT
20
NONBIOMETRIC SECURITY
MEASURES
A callback modem verifies whether a user’s access is valid by logging the user
off (after he or she attempts to connect to the network) and then calling the user
back at a predetermined number.
21
PHYSICAL SECURITY MEASURES
Primarily control access to computers and networks, and they include devices
for securing computers and peripherals from theft.
22
ACCESS CONTROLS
A virtual private network (VPn) provides a secure “tunnel” through the Internet
for transmitting messages and data via a private network.
23