Sit 403
Sit 403
• Bespoke
– Custom-made to solve a specific business solution
e.g KIEMS, IFMIS
Considerations
• Service Level Agreements
• Technical Support
• Training
• License Types
• Legal Conformations
LESSON TWO
IS Security
• Information System security refers to protecting the system
from theft, unauthorized access and modifications, and
accidental or unintentional damage.
Int
Integrity – data has not been
nti
eg
altered in an unauthorized
de
r ity
manner
nfi
Co
95752:1-12
Technical System Threats
• Hacking: Unauthorized user gaining access to a computer or a
network.
• Environmental: Natural events such as tornadoes, power loss, fires, and floods pose hazards to
the infrastructure in which data assets are located.
• Insider Threat: Employees, contractors, or partners can commit fraud, espionage or theft of
intellectual property.
• Social Media: Employees often fall victim to scams or reveal information not intended for public
knowledge on social media.
• Dumpster Diving: Improper disposal of sensitive data could lead to improper disclosures and
sensitive information just sitting in trash bins. Having internal procedures when disposing of
sensitive documents is crucial in preventing this kind of a non-technical vulnerability.
• Social Engineering: Attackers rely heavily on human interaction to gain access to company
networks or systems, usually tricking users into breaking normal security procedures and
revealing their account credentials.
Malware Types
Programs similar to viruses except that they are not hidden within other files.
Worms
Worms often spread through emails.
Programs which pretend to be legitimate but in reality are malware. They are
Trojans often disguised as email attachments. Trojans cannot spread by themselves -
instead they deceive a user into installing the program.
– Examples of Floods
• ICMP Flood
• SYN Flood
• HTTP Flood
Benefits
– Identification of C2 Infrastructure