Information Security: Barbarians at The Gateway (And Just About Everywhere Else)
Information Security: Barbarians at The Gateway (And Just About Everywhere Else)
Information Security:
Barbarians
at the Gateway (and Just
about Everywhere Else)
Introduction
• Security breaches
• Factors that can amplify a
firm’s vulnerability of a
breach:
• Personnel issues
• Technology problems
• Procedural factors
• Operational issues
• Constant vigilance
regarding security needs to
be:
• Part of one’s individual skill
set.
Tenets of Information Systems Security
Why is This Happening? Who’s Doing it?
And What’s Their Motivation?
CYBERWARFA
EXTORTION ESPIONAGE
RE
PROTEST
TERRORISM PRANKSTERS
HACKING
INTELLECTUAL
REVENGE PROPERTY
THEFT
Malicious Activity on the Rise
Customer data
IT and network infrastructure
Intellectual property
Finances and financial data
Service availability and productivity
Reputation
Why is This Happening? Who’s Doing it?
And What’s Their Motivation? (cont’d)
• Bad apples
• Rogue employees who steal secrets, install malware,
or hold a firm hostage.
• Social engineering
• Con games that trick employees into revealing
information or performing other tasks that
compromise a firm.
• phishing: Cons executed using technology, in
order to acquire sensitive information or trick
someone into installing malicious software.
• spoofed: Email transmissions and packets that
User and Administrator Threats (cont’d)
• encryption:
SCRAMBLINGScrambling data
DATA USING A CODE, using
THEREBY a code,
HIDING
IT FROM THOSE WHO DO NOT HAVE THE UNLOCKING
thereby hiding it from KEY those who do not
have the unlocking key.
• key: Code that unlocks encryption.
• brute-force attacks: Exhausts all possible
password combinations to break into an
account.
How do Websites Encrypt Transmissions?