Upload
noel-ford
View
218
Download
0
Embed Size (px)
DESCRIPTION
Downtime: A period of time when systems are unavailable that results in lost revenues and legal expenses Primary reasons downtime occurs are power loss and hackers PROTECTING INTELLECTUAL ASSETS
Citation preview
Matt BromanKodiac GambleDevin Nichol
SECTION 4.2INFORMATION
SECURITY
Information Security:Encompassing the protection of information from accidental or intentional misuse from people
Primary tool used to combat threats associated with downtime
PROTECTING INTELLECTUAL ASSETS
Downtime:A period of time when systems are unavailable that results in lost revenues and legal expenses
Primary reasons downtime occurs are power loss and hackers
PROTECTING INTELLECTUAL ASSETS
Hackers:Technology experts who break into computers for either a profit or a challenge
Good or Bad:HactivistsWhite-hat hackersBlack-hat hackersCrackers
SECURITY THREATS
Virus:Software written with intent to annoy or cause damage
Forms:Denial of Service (DoS)
Trojan HorseWorm
SECURITY THREATS
Adware:Software that allows internet advertisers to display ads without consent of the user
Spyware:Special adware that collects data about the user and transmits it over the user without the users knowledge
SECURITY THREATS
Antivirus SoftwareFinds and removes know viruses, adware and spyware.
Keep up to date to protect from new viruses!
SECURITY THREATS
Information Security PlanDetailed process of how a organization will implement information security policies
Information Security Policies Identifying rules to maintain information security
PROTECTING AGAINST HACKERS
Authorization:Process of providing a user with permission including access levels and file access
Authentication:methods for confirming user’s identities
User ID and PasswordSmart Card or TokenFingerprints
TECHNOLOGY DEFENSES
Content Filtering Software that filters
content such as emails to prevent unauthorized information
Encryption scrambles information into
an alternative form that requires a password to decrypt
Firewall Software that guards a
network by analyzing incoming and outgoing information for the correct markings
DATA PREVENTION & RESISTANCE
Intrusion Detection Software (IDS):Monitoring tools that search for patterns in network traffic to identify intruders
Protects against suspicious network traffic and attempts to access files and data
DETECTION & RESPONSE
1. What is one of the primary reasons for the occurrence of downtime?
2. What type of hacker uses their ability for good?
3. What does Spyware do? 4. Name of the methods used for confirming a
user’s identity5. What is the purpose of Intrusion Detection
Software?
QUESTIONS