Digital data is vulnerable to
destruction, misuse, error, fraud, and hardware of software failures
Spoofing
Tricking or deceiving computer systems by hiding or faking one’s identity (fake e-mail addresses or masquerading as someone else)
Sniffing
type of eavesdropping program that monitors information traveling over network (f.e. enables hackers to steal information)
Denial-of-Service attacks (DoS) & Distributed DOS (DDoS)
DoS: flooding server with thousands of false requests to crash the network
DDoS: use of numerous computers to launch a DoS
Botnets
networks of “zombie” PC’s infiltrated by bot malware, can perform spam attacks , DoS, etc.
Identity Theft
Theft of personal information (social security ID, driver’s license, or credit card numbers) to impersonate someone else
Phishing
setting up fake websites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data
Evil twins
wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet
Pharming
redirects users to a bogus web page, even when individual types correct Web page address into their browser
Click Fraud
occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase - imitate users clicking on your system
Internal threats: Employees
Software presents problems because
Malware
can disable systems and websites, with special focus on mobile devices
Firms relying on computer systems for their core business functions are at risk of
various information assets such as business plans lose value if
they are released to outsiders or of they expose the firm to legal liability
electronic evidence (probative digital material) and computer forensics also require firms to
pay more attention to security and electronic records management
General Controls (for IS)
Application Controls (for IS)
Risk assessment
Security policy
Identity management software
Authentication
password systems, tokens, smart cards, etc.
Firewall
combination of hardware and software that prevents unauthorised users from accessing private networks
Intrusion detection systems