Information Security
the degree a system and its data are resistant to and protected from harm from a specific threat.
Security breach
any incident that causes harm or unauthorized access to systems or their data
-direct monetary damages, negative impact on firm’s market value and reputation, or lead to government penalties
Reasons of being a victim in security breach:
Types of identity theft:
identity theft
the unauthorized use of a person’s private information for gain
Financial Identity Theft
stealing another person’s credit card or bank account number. This may also include using one’s identity (social security number, address, name, etc.) to apply for a credit card or loan that may impact credit ratings or cause unmerited financial obligations.
Medical Identity Theft
stealing another person’s personal information to obtain medical care, buy drugs, or submit fake billings to an insurance company. Aside from its financial consequences, it could be life threatening if wrong information is inserted into one’s medical records and wrong medical actions are taken based on these records.
Criminal Identity Theft
giving another person’s name, date of birth, driver’s license number, etc., to a law enforcement officer during an investigation or upon arrest. This may result in false criminal records, fines, or other illegal actions.
Child Identity Theft
stealing a minor’s social security number for personal gain. This type of fraud can go undetected for years, and it may not be discovered until a child’s later years (when applying for a driver’s license, a bank account, etc.).
Know other people
-attackers try to exploit other people’s social networks to steal from or harm their friends, work colleagues, and acquaintances.
Access to computing resources
zombies/bots
computer that can be controlled by a third party after being infected
Who causes security threats?
Hacker
-people who try to attack an organization from the outside
-variety of motivations:
+for the challenge or curiosity
+receive monetary compensation for breaking into a computer system, stealing or destroying info
Hactivists
Cyberterrorists
refer to hackers who use the internet to accomplish terrorist acts. Cyberterrorist acts may include disrupting or destroying an organization’s or nation’s infrastructure, such as disrupting a nation’s power supply or communication lines.
Cyberwarfare
refers to nations or groups that conduct espionage or sabotage of another nation’s or organization’s information and infrastructure through hacking techniques
White-hat hackers
hackers hired by organizations to break into their systems to expose vulnerabilities so the organizations can fix them
malicious insider threats
-EX: purposely install malware on a system, steal or expose sensitive information, sabotage systems, delete information, steal hardware, or perform financial fraud
non-malicious threats
computer crime
a crime that targets a computer, or using a computer to commit theft
Internet crime
crime that specifically involved the internet, such as soliciting information to commit identity theft
CIA Triad
-security threats and countermeasures
Confidentially
Restricting access to information and resources to those who are authorized to use it
EX: online bank account is protected with a username and password to ensure that only the owner can access it