CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2...
-
Upload
erika-floyd -
Category
Documents
-
view
231 -
download
2
Transcript of CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2...
![Page 1: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/1.jpg)
CHAPTER 4
Information Security
![Page 2: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/2.jpg)
CHAPTER OUTLINE
4.1 Introduction to Information Security
4.2 Unintentional Threats to Information Security
4.3 Deliberate Threats to Information Security
4.4 What Organizations Are Doing to Protect
Information Resources
4.5 Information Security Controls
![Page 3: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/3.jpg)
LEARNING OBJECTIVES
1. Identify the five factors that contribute to the increasing vulnerability of information resources, and provide a specific example of each one.
2. Compare and contrast human mistakes and social engineering, and provide a specific example of each one.
3. Discuss the ten types of deliberate attacks.
![Page 4: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/4.jpg)
LEARNING OBJECTIVES (continued)
4. Define the three risk mitigation strategies, and provide an example of each one in the context of you owning a home.
5. Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one.
![Page 5: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/5.jpg)
Opening Case: Kim Dotcom
![Page 6: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/6.jpg)
4.1 Introduction to Information Security
![Page 7: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/7.jpg)
Key Information Security Terms
Information Security
Threat
Exposure
Vulnerability
Example of a threat (video)
![Page 8: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/8.jpg)
Five Factors Increasing the Vulnerability of Information Resources
Today’s interconnected, interdependent, wirelessly-networked business environment
Smaller, faster, cheaper computers and storage devices
Decreasing skills necessary to be a hacker
Organized crime taking over cybercrime
Lack of management support
![Page 9: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/9.jpg)
Networked Business Environment
![Page 10: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/10.jpg)
Smaller, Faster Devices
![Page 11: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/11.jpg)
Increasing Sophistication of Attacks
Low
High
1980 2011
Attack Sophistication
Knowledge Required by Intruder
WiGLE.net
New & Easier Attack Tools
Decreasing Skills Needed to be a hacker
New & Easier Tools make it very easy to attack the Network
![Page 12: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/12.jpg)
Organized Crime Taking Over Cybercrime
![Page 13: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/13.jpg)
Lack of Management Support
![Page 14: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/14.jpg)
4.2 Unintentional Threats to Information Systems
![Page 15: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/15.jpg)
Security Threats (Figure 4.1)
![Page 16: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/16.jpg)
Most Dangerous Employees
Human resources and MIS
These employees hold ALL the information
![Page 17: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/17.jpg)
Consultants, Janitors and Security Guards
![Page 18: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/18.jpg)
Human Errors
Carelessness with laptops and portable computing devices
Opening questionable e-mails
Careless Internet surfing
Poor password selection and use
And more
![Page 19: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/19.jpg)
Social Engineering
Two examples
Tailgating
Shoulder surfing
![Page 20: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/20.jpg)
Anti-Tailgating Door
![Page 21: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/21.jpg)
Shoulder Surfing
![Page 22: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/22.jpg)
The “King” of Social Engineering
60 Minutes Interview with Kevin Mitnick
Kevin Mitnick served several years in a federal prison. Upon his release, he opened his own consulting firm, advising companies on how to deter people like him
See his company here
![Page 23: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/23.jpg)
4.3 Deliberate Threats to Information Systems
![Page 24: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/24.jpg)
Deliberate Threats
Espionage or trespass
Information extortion
Sabotage or vandalism
Theft of equipment or information For example, dumpster diving
![Page 25: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/25.jpg)
Deliberate Threats (continued)
Identify theft
Identity theft video
Compromises to intellectual property
Medical identity theft video
![Page 26: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/26.jpg)
Deliberate Threats (continued)
Software attacksVirus
Worm 1988: first widespread worm, created by Robert T. Morris, Jr.
(see the rapid spread of the Slammer worm)
Trojan horse
Logic Bomb
![Page 27: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/27.jpg)
Software attacks (continued)Phishing attacks
Phishing slideshow Phishing quiz Phishing example Phishing example
Distributed denial-of-service attacks See botnet demonstration
Deliberate Threats (continued)
![Page 28: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/28.jpg)
How to Detect a Phish E-mail
![Page 29: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/29.jpg)
Is the email really from eBay, or PayPal, or a bank?
As Spammers get better, their emails look more genuine. How do you tell if it’s a scam and phishing for personal information? Here’s how ...
![Page 30: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/30.jpg)
Is the email really from eBay, or PayPal, or a bank?
As an example, here is what the email said: Return-path: <[email protected]> From: "PayPal"<[email protected]> Subject: You have 1 new Security Message Alert !
Note that they even give
advice in the right column
about security
![Page 31: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/31.jpg)
Example Continued – bottom of the email
![Page 32: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/32.jpg)
How to see what is happening View Source In Outlook, right click on email, click ‘view source’ In GroupWise, open email and click on the Message Source tab In Mozilla Thunderbird, click on View, and Source. Below is the part of the text that makes the email look official – the images came
from the PayPal website.
![Page 33: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/33.jpg)
View Source – The Real Link
In the body it said, “If you are traveling, “Travelling Confirmation Here”
Here is where you are really being sent href=3Dftp://futangiu:[email protected]/
index.htm
Notice that the link is not only not PayPal, it is an IP address, 2 giveaways of a fraudulent link.
![Page 34: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/34.jpg)
Another Example – Amazon
View Source
![Page 35: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/35.jpg)
Deliberate Threats (continued)
Alien SoftwareSpyware (see video)
Spamware
CookiesCookie demo
![Page 36: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/36.jpg)
Keystroke Logger (Keylogger)
Plugs in between monitor and computer
![Page 37: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/37.jpg)
Example of CAPTCHA
![Page 38: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/38.jpg)
Deliberate Threats (continued)
Supervisory control and data acquisition (SCADA) attacks
Wireless sensor
![Page 39: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/39.jpg)
What if a SCADA attack were successful?
Northeastern U.S. power outage in 2003
![Page 40: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/40.jpg)
Results of the power outage in NYC
![Page 41: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/41.jpg)
More results of power outage in NYC
![Page 42: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/42.jpg)
Example of SCADA attack (and cyberwarfare)
The Stuxnet Worm (IT’s About Business 4.3)
Where Stuxnet struck
Stuxnet video
![Page 43: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/43.jpg)
Cyberwarfare and Cyberterrorism
See video
![Page 44: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/44.jpg)
4.4 What Organizations Are Doing to Protect Themselves
![Page 45: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/45.jpg)
Risk!
There is always risk!
![Page 46: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/46.jpg)
And then there is real risk!
![Page 47: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/47.jpg)
Risk Management
Risk
Risk management
Risk analysis
Risk mitigation
![Page 48: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/48.jpg)
Risk Mitigation Strategies
Risk Acceptance
Risk limitation
Risk transference
![Page 49: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/49.jpg)
Risk Optimization
![Page 50: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/50.jpg)
4.5 Information Security Controls
![Page 51: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/51.jpg)
Information Security Controls
Physical controls
Access controls
Communications (network) controls
![Page 52: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/52.jpg)
Where Defense Mechanisms (Controls) Are Located
![Page 53: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/53.jpg)
Access Controls
AuthenticationSomething the user is (biometrics powerpoints)
Video on biometrics The latest biometric: gait recognition
Something the user has
Something the user does
Something the user knows passwords passphrases
![Page 54: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/54.jpg)
Access Controls (continued)
Authorization
Privilege
Least privilege
![Page 55: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/55.jpg)
Communications Controls
Firewalls
Anti-malware systems
Whitelisting and Blacklisting
Encryption
![Page 56: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/56.jpg)
Communication or Network Controls (continued)
Virtual private networking
Secure Socket Layer (now transport layer security)
Employee monitoring systems
![Page 57: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/57.jpg)
Basic Home Firewall (top) and Corporate Firewall (bottom)
![Page 58: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/58.jpg)
Whitelisting and Blacklisting
Whitelisting Blacklisting
![Page 59: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/59.jpg)
How Digital Certificates Work
![Page 60: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/60.jpg)
Virtual Private Network and Tunneling
![Page 61: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/61.jpg)
Transport Layer Security
![Page 62: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/62.jpg)
Popular Employee Monitoring Systems
![Page 63: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/63.jpg)
Employee Monitoring System
![Page 64: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/64.jpg)
Business Continuity Planning, Backup, and Recovery
Hot Site
Warm Site
Cold Site
![Page 65: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/65.jpg)
Information Systems Auditing
Types of Auditors and Audits
Internal
External
![Page 66: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/66.jpg)
IS Auditing Procedure
Auditing around the computer
Auditing through the computer
Auditing with the computer
![Page 67: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/67.jpg)
Chapter Closing Case
![Page 68: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.](https://reader038.fdocuments.net/reader038/viewer/2022102818/56649d305503460f94a08a16/html5/thumbnails/68.jpg)
Chapter Closing Case