Information security
Information Security refers to the procedures and techniques which are composed and implemented to ensure print, electronic, or other form of private and sensitive information from unapproved access, utilization, destruction, divulgence, change, or interruption. (http://www.sans.org/information-security)
Need for Information security
Business objectives and privacy drive the need for Information security. For a period, data security was affected to some degree by trepidation, lack of determination, and uncertainty. Examples of these impacts included the fear of another worm episode or virus attack. But regardless of the security suggestions, business needs needed to come first. (http://www.ciscopress.com/articles/article.asp?p=1998559)
Threat
A Threat is a potential peril to data or systems. (http://www.ciscopress.com/articles/article.asp?p=1998559)
Threat vectors
Social engineering: Social engineering takes another importance in the period of social networking. From phishing strike that target social network records of prominent people, to data exposure because of absence of law or policy, social networks have turned into a focus malicious attackers.
Smart phone exploits: The operating systems on consumer electronics are a choice of decision for high-volume strike. The multiplication of applications for these devices increased the issue.
Memory scraping: This procedure is aimed at getting data specifically from volatile memory. The strike tries to exploit systems and applications that leave hints of information in memory. Attacks are particularly aimed at data that may be prepared as decoded in volatile memory.
Hardware hacking: These attacks are aimed at exploiting the hardware architecture of specific dev...
... middle of paper ...
...to get access to your system or the data on your system. These attacks keep tabs on making an administration distracted for ordinary utilization. Attacks ordinarily finish this by depleting some asset impediment on the system or inside a network or provision. These attacks normally oblige little exertion to execute on the grounds that they either exploit convention shortcomings or use activity typically permitted into a system. Dos attacks are around the most troublesome to totally dispose of due to the way they utilize protocol weakness and acknowledged movement to strike a system. A few programmers view Dos assaults as insignificant and in awful structure on the grounds that they oblige so little exertion to execute. Still, on account of their simplicity of usage and conceivably noteworthy harm, Dos assaults deserve exceptional consideration from security experts.
The term social engineering refers to intrusion that is non-technical but a result of human interaction. The attacker uses trickery to gain the confidence of an authorized user tricking them into giving up information that the attacker can use to gain access to systems and compromise normal security procedures. Most of the time authorized system users are unaware of the fact they have access to important information, and the attackers prey on these type of users who they know can be careless about protecting it. The greatest threat to security systems today are a result of social engineering. (Rouse, 2006)
Social Engineering: What It Is and How to Help Protect Yourself. (n.d.). Retrieved from http://www.microsoft.com/security/resources/socialengineering-whatis.aspx
Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of computer, etc.
to crack by using traditional method e.g. Brute force. So Mostly Attacks performed passively which is also known as Side Channel Attacks.
[15] T. J. Klevinsky, Scott Laliberte, and Ajay Gupta. (2002). Hack I.T.: Security Through Penetration Testing. Addison-Wesley Professional.
The computer is considered one of the most important technological advances of the twentieth century. Security and privacy issues have been in existence long before the computer became a vital component of organizations' operations. Nevertheless, the operating features of a computer make it a double-edged sword. Computer technologies with reliable error detection and recording capabilities, permit the invasion of a supposedly secure environment to occur on a grand scale and go undetected. Furthermore, computer and communications technology permit the invasion of a persons' privacy and likewise go undetected. Two forces threaten privacy: one, the growth of information technology with its enhanced capacity for surveillance, communication, computation, storage and retrieval and two, the more insidious threat, the increased value of information in decision making. Information has become more vital in the competitive environment, thus, decision makers covet it even if it viol!
Whitman, M., & Mattord, H. (2010). Management of information security. (3rd ed., p. 6). Boston, MA: Cengage Learning.
While the conventional desktop PC will still continue to serve important functions at both consumer and professional levels, there is an expectation that mobile devices will become the predominant form for accessing both personal and professional content; it is understandable that cyber criminals have begun focusing on mobile devices which have at the same time grown their user base while substantially consolidating the operating system variants which makes the surface area for a potential attack substantially larger (Juniper Networks, n.d.).... ... middle of paper ... ... Mobile Device Security: A Survey of Mobile Device Threats, Vulnerabilities and their Defensive Mechanism. International Journal of Computer Applications.
Cybersecurity, it a vital part of daily life. Now with the world transitioning away from paper and becoming more reliant on the use of the ability to operate through some form of online apparatus. From the moment one unlocks the phone on their dresser they have become embodied in the use of cybersecurity. Logging into Facebook or Snapchat one is at the whim of the sites cybersecurity and privacy settings. Checking the balance in a person's banking account on their laptop from home requires the use of cybersecurity. Even when a customer wants to make that online purchase from Target proper Cyber security policies are required. No matter what is being done online, either via computer or phone in some form or fashion there is a certain level of cybersecurity required. Cybersecurity is important because it allows all aspects of our social construct to be stabilized, and it allows. our private information to be secure.
One of the things though is that we don’t only see schemes on social networks it could happen on any site that requires you to share information. Things like online shopping require you to share some of your personal information along with your bank information so if the site doesn’t have a strong security system it can have consequences. There are intelligent hacker1s and scammers that can breach the security system and steal your bank information. Three simple steps such as typing your name, birthdate, and zip code is more than enough for someone to try and steal your identity or use your information to their advantage. Theodore Claypoole in “Privacy and Social Media” said how the United States is trying its best to pass laws and keep up to date with new software in order to help protect people from falling into the realms of cyber criminals (Privacy and Social Media). As time passes technology is advancing and sharing our information is becoming easier, so it’s necessary for our security software to be up to
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
Today technology has created new styles of communication on the internet for us all. This technology has made great impact on everyday life in today’s society. Cyber communications have become hugely popular in the last decade, especially those websites that help people to find new or old friends, keep in touch with families, and even help people to find potential dates! The numbers of people using cyber social networking are growing in millions every year. Cyber social networks have helped people link to each other with common interests, and expand personal ideas and support worldwide. But people are getting too friendly with this technology. Dangers are slowly appearing, and there still have a lot of hidden threats. Cyber social networks are threats to our personal social lives, lead into new addictions, and compromise the security of privacy issues.
However, much like any other part of the internet, social networks can be frought with serious security risks, both for your person, and your data.
Cybercrime and social media are two major global problems that impact society. Today, are more accessible to computers and the Internet than in years prior. Nonetheless, perpetrators attack social media with illegal activity to facilitate their crime. There are different strategies or practices by various countries to combat cybercrime. However, identity theft, cyberbullying and phishing are three major type of cybercrimes which are impacting social networking websites.
Privacy exist wherever personal information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. The challenge of data privacy is to use data while safe-guarding individual's privacy preferences and their personally identifiable information. The fields of computer security, data security, and information security design and utilize software, hardware, and human resources to address this issue.