1 / 8

Risk, Security and Disaster Recovery

Risk, Security and Disaster Recovery. Risk To Software Mohd Mazeez Mohd Mazlan 4123011591 Raihan Binti Mad Aris 4123012661 Nor Siti Farah Binti Abd Rahman 4123011451 Siti Aisyah Binti Amat Jalani 4123013061. Risks to Data and Applications.

sybil
Download Presentation

Risk, Security and Disaster Recovery

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Risk, Security and Disaster Recovery Risk To Software Mohd Mazeez Mohd Mazlan 4123011591 Raihan Binti Mad Aris 4123012661 Nor Siti Farah Binti Abd Rahman 4123011451 Siti Aisyah Binti Amat Jalani 4123013061

  2. Risks to Data and Applications • Data primary concern because it is a unique resource. • Susceptible to • Disruption • Damage • Theft

  3. Theft of Information and Identity Theft may be for identity theft, corporate espionage, etc. identity theft: using another person's credentials • Keystroke logging: record individual keystrokes • Social engineering: con artists pretending to be service people • Identity theft: pretending to be another person

  4. Data Alteration, Data Destruction, and Web Defacement • Risk to data • Alteration : sometimes hard to notice. but can be very damaging • Destruction : usually very noticeable, and can be alleviated somewhat by having good backup procedures in place. • Web defacement : basically vandalism, similar to graffiti, but can cost businesses a lot in lost revenue • Deliberate alteration or destruction is a prank/mischief. • Target may be Web site

  5. Data Alteration, Data Destruction, and Web Defacement(continued) • Honeytoken: fake record in networked database • Used to combat hackers • Honeypot: server containing mirrored copy of database • Educated security officers of vulnerable points

  6. Computer Viruses, Worms, and Logic Bombs • Virus: spread from computer to computer • Worm: spread in network without human intervention • Antivirus software: protect against viruses • Trojan horse: virus disguised as legitimate software

  7. Computer Viruses, Worms, and Logic Bombs (continued) • Logic bomb: cause damage at specific time. Usually planted by insiders. • Unintentional damage • Human error • Lack of adherence to backup procedures • Poor training • Unauthorized downloading may cause damage

  8. Computer Viruses, Worms, and Logic Bombs (continued)

More Related