SlideShare a Scribd company logo
1 of 13
THREATS
TO
INFORMATION
RESOURCES
Shimna K
3rd Sem MBA
CMS
Information Systems (IS)
An information system(IS) is typically considered to be a set of
interrelated elements or components that
collect(input), manipulate(processes), and disseminate (output)
data and information and provide a feedback mechanism to meet
an objective.

Information Systems Security
It refers to the policies, procedures, and technical measures
adopted to prevent potential threats to IS resources.
IS Security Threats
A threat to an information resource is any danger
to which a system may be exposed.
•
•
•
•
•
•

Human errors or failures
Manipulation of data/systems
Theft of data/system
Destruction from virus
Technical; failure/errors of systems
Natural disasters like
flood, fire, earthquake, etc
1. Human Errors or Failures
Unintentional errors
Entry of wrong data
Accidental deletion
Modification of data
Storage of data in unprotected areas like desktop, website, trash bin
Disclosing of confidential data
These errors may happen because of;

Lack of experience
Improper training
2. Manipulation of data/systems
This category of threats happens because of Deliberate
acts to harm the data or IS of an organization.
An unauthorized individual gains an access to the
private/confidential or important data of an organization.
Intentionally do some wrong acts like delete, corrupt or
steal the data.
3. Theft of data/systems
It is a deliberate attempt of some person to steal the
important data of an organization.
Thieves may steal physical items like entire pc, circuit
boards & memory chips, the theft of electronic data pose
a greater challenge.
Telecommunication networks are highly misused by
computer experts.
The person who intercepts the communication lines to
steal data without the knowledge of the owner of the
data is known as hacker.
4. Destruction from virus
Deliberate software attack

This kind of attack happens when a person or a group write
software to attack data or IS of and organization with the
purpose to damage, destroy, or deny service to the target
systems.
The programme which is written with an intent to attack
data or IS is known as malicious code or malicious
software or malware.
Eg: viruses and worms, Trojan horses, logic-bombs etc.
The computer viruses are the secret instructions inserted into
programs or data that run during ordinary tasks. The secret
instructions may destroy or alter data as well as spread within or
between computer systems.

Worms refers to a program which replicates itself constantly
and penetrates a valid computer system.
Trojan horses refers to illegal programs contained within
another useful or beneficial program, that hide their true nature
or sleeps until some specific event occurs hen triggers the
illegal program becomes infected which is not known to
the user. Many viruses can be hidden in Trojan horses,
but Trojan horses do no have the ability to replicate
themselves.
Logic bombs or time bomb is a kind of programme that executes
when certain conditions are met. It is similar to Trojan horse in its
ability to damage data but it activates at a particular time.
5. Technical failure/ errors of systems
Manufacturing defects in the hardware or the hidden faults in the
software.
Unique combinations of certain software and hardware may give
new errors.
Technological obsolescence.
6. Natural disasters
Not because of unintentional or deliberate acts.
Threats include fire, flood, earthquake, lightning etc.
REFERENCE
MIS, DP GOYAL
INTERNET
Threats to Information Resources - MIS - Shimna

More Related Content

What's hot

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Business information system with explaination
Business information system with explainationBusiness information system with explaination
Business information system with explainationAlana Abraham
 
Erp & e commerce
Erp & e commerceErp & e commerce
Erp & e commerceAli Mcc
 
DATA WAREHOUSING
DATA WAREHOUSINGDATA WAREHOUSING
DATA WAREHOUSINGKing Julian
 
Introduction to erp system
Introduction to erp systemIntroduction to erp system
Introduction to erp systemshalomjudit3
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systemsBimbashree K.G
 
Enterprise Resource Planning(ERP)
Enterprise Resource Planning(ERP)Enterprise Resource Planning(ERP)
Enterprise Resource Planning(ERP)Makan Singh
 
Enterprise Resource Planning Unit 4 post implementation on ERP
Enterprise Resource Planning Unit 4 post implementation on ERPEnterprise Resource Planning Unit 4 post implementation on ERP
Enterprise Resource Planning Unit 4 post implementation on ERPGanesha Pandian
 
Computer Security PowerPoint Presentation Slides
Computer Security PowerPoint Presentation SlidesComputer Security PowerPoint Presentation Slides
Computer Security PowerPoint Presentation SlidesSlideTeam
 
Office Automation System (OAS)
Office Automation System (OAS)Office Automation System (OAS)
Office Automation System (OAS)Jaisha Jaikishan
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information systemRohit Kumar
 
Information system for strategic advantage
Information system for strategic advantageInformation system for strategic advantage
Information system for strategic advantageHarmanjeet Kaur
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityarun alfie
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing systemanjana1994
 

What's hot (20)

Social and ethical issues in commerce
Social and ethical issues in commerceSocial and ethical issues in commerce
Social and ethical issues in commerce
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Business information system with explaination
Business information system with explainationBusiness information system with explaination
Business information system with explaination
 
Erp & e commerce
Erp & e commerceErp & e commerce
Erp & e commerce
 
DATA WAREHOUSING
DATA WAREHOUSINGDATA WAREHOUSING
DATA WAREHOUSING
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Mis notes
Mis notesMis notes
Mis notes
 
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
 
Introduction to erp system
Introduction to erp systemIntroduction to erp system
Introduction to erp system
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systems
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
Enterprise Resource Planning(ERP)
Enterprise Resource Planning(ERP)Enterprise Resource Planning(ERP)
Enterprise Resource Planning(ERP)
 
Enterprise Resource Planning Unit 4 post implementation on ERP
Enterprise Resource Planning Unit 4 post implementation on ERPEnterprise Resource Planning Unit 4 post implementation on ERP
Enterprise Resource Planning Unit 4 post implementation on ERP
 
Computer Security PowerPoint Presentation Slides
Computer Security PowerPoint Presentation SlidesComputer Security PowerPoint Presentation Slides
Computer Security PowerPoint Presentation Slides
 
Office Automation System (OAS)
Office Automation System (OAS)Office Automation System (OAS)
Office Automation System (OAS)
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information system
 
Information system for strategic advantage
Information system for strategic advantageInformation system for strategic advantage
Information system for strategic advantage
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 

Viewers also liked

Viewers also liked (19)

Top 10 Reasons for ERP Project Failure
Top 10 Reasons for ERP Project FailureTop 10 Reasons for ERP Project Failure
Top 10 Reasons for ERP Project Failure
 
ERP and MIS
ERP and MISERP and MIS
ERP and MIS
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Erp benefits
Erp benefitsErp benefits
Erp benefits
 
Chapter 6 Mis And Erp
Chapter 6 Mis And ErpChapter 6 Mis And Erp
Chapter 6 Mis And Erp
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Customer relationship management in mis ppt
Customer relationship management in mis pptCustomer relationship management in mis ppt
Customer relationship management in mis ppt
 
MIS 13 Customer Relationship Management
MIS 13 Customer Relationship ManagementMIS 13 Customer Relationship Management
MIS 13 Customer Relationship Management
 
DATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MININGDATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MINING
 
OLAP
OLAPOLAP
OLAP
 
Warehousing
WarehousingWarehousing
Warehousing
 
CRM with MIS
CRM with MISCRM with MIS
CRM with MIS
 
Porter's Value Chain Presentation 1
Porter's Value Chain Presentation 1Porter's Value Chain Presentation 1
Porter's Value Chain Presentation 1
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Basics of Supply Chain Managment
Basics of Supply Chain ManagmentBasics of Supply Chain Managment
Basics of Supply Chain Managment
 
Customer Relationship Management (CRM)
Customer Relationship Management (CRM)Customer Relationship Management (CRM)
Customer Relationship Management (CRM)
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain Management
 
Value chain analysis
Value chain analysisValue chain analysis
Value chain analysis
 

Similar to Threats to Information Resources - MIS - Shimna

Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityAliyuMuhammadButu
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
Health information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskHealth information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskDr. Lasantha Ranwala
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Komal Mehfooz
 
Threat vs risk vs attack vs Asset vs vulnerability
Threat vs risk vs attack vs Asset vs  vulnerability Threat vs risk vs attack vs Asset vs  vulnerability
Threat vs risk vs attack vs Asset vs vulnerability Osama Ellahi
 
Cyber security
Cyber securityCyber security
Cyber securitygogulraj25
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Computer Threat.pdf
Computer Threat.pdfComputer Threat.pdf
Computer Threat.pdfZaraFatima29
 

Similar to Threats to Information Resources - MIS - Shimna (20)

Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
Need for security
Need for securityNeed for security
Need for security
 
Computer security
Computer securityComputer security
Computer security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
System tThreats
System tThreatsSystem tThreats
System tThreats
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Health information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskHealth information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and risk
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Threat vs risk vs attack vs Asset vs vulnerability
Threat vs risk vs attack vs Asset vs  vulnerability Threat vs risk vs attack vs Asset vs  vulnerability
Threat vs risk vs attack vs Asset vs vulnerability
 
Cyber security
Cyber securityCyber security
Cyber security
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Computer Threat.pdf
Computer Threat.pdfComputer Threat.pdf
Computer Threat.pdf
 

Recently uploaded

MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 

Recently uploaded (20)

MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 

Threats to Information Resources - MIS - Shimna

  • 2. Information Systems (IS) An information system(IS) is typically considered to be a set of interrelated elements or components that collect(input), manipulate(processes), and disseminate (output) data and information and provide a feedback mechanism to meet an objective. Information Systems Security It refers to the policies, procedures, and technical measures adopted to prevent potential threats to IS resources.
  • 3. IS Security Threats A threat to an information resource is any danger to which a system may be exposed. • • • • • • Human errors or failures Manipulation of data/systems Theft of data/system Destruction from virus Technical; failure/errors of systems Natural disasters like flood, fire, earthquake, etc
  • 4. 1. Human Errors or Failures Unintentional errors Entry of wrong data Accidental deletion Modification of data Storage of data in unprotected areas like desktop, website, trash bin Disclosing of confidential data These errors may happen because of; Lack of experience Improper training
  • 5. 2. Manipulation of data/systems This category of threats happens because of Deliberate acts to harm the data or IS of an organization. An unauthorized individual gains an access to the private/confidential or important data of an organization. Intentionally do some wrong acts like delete, corrupt or steal the data.
  • 6. 3. Theft of data/systems It is a deliberate attempt of some person to steal the important data of an organization. Thieves may steal physical items like entire pc, circuit boards & memory chips, the theft of electronic data pose a greater challenge. Telecommunication networks are highly misused by computer experts. The person who intercepts the communication lines to steal data without the knowledge of the owner of the data is known as hacker.
  • 7. 4. Destruction from virus Deliberate software attack This kind of attack happens when a person or a group write software to attack data or IS of and organization with the purpose to damage, destroy, or deny service to the target systems. The programme which is written with an intent to attack data or IS is known as malicious code or malicious software or malware. Eg: viruses and worms, Trojan horses, logic-bombs etc.
  • 8. The computer viruses are the secret instructions inserted into programs or data that run during ordinary tasks. The secret instructions may destroy or alter data as well as spread within or between computer systems. Worms refers to a program which replicates itself constantly and penetrates a valid computer system. Trojan horses refers to illegal programs contained within another useful or beneficial program, that hide their true nature or sleeps until some specific event occurs hen triggers the illegal program becomes infected which is not known to the user. Many viruses can be hidden in Trojan horses, but Trojan horses do no have the ability to replicate themselves.
  • 9. Logic bombs or time bomb is a kind of programme that executes when certain conditions are met. It is similar to Trojan horse in its ability to damage data but it activates at a particular time.
  • 10. 5. Technical failure/ errors of systems Manufacturing defects in the hardware or the hidden faults in the software. Unique combinations of certain software and hardware may give new errors. Technological obsolescence.
  • 11. 6. Natural disasters Not because of unintentional or deliberate acts. Threats include fire, flood, earthquake, lightning etc.