130 likes | 322 Views
Risk, Security and Disaster Recovery. Risk To Software Mohd Mazeez Mohd Mazlan 4123011591 Raihan Binti Mad Aris 4123012661 Nor Siti Farah Binti Abd Rahman 4123011451 Siti Aisyah Binti Amat Jalani 4123013061. Risks to Data and Applications.
E N D
Risk, Security and Disaster Recovery Risk To Software Mohd Mazeez Mohd Mazlan 4123011591 Raihan Binti Mad Aris 4123012661 Nor Siti Farah Binti Abd Rahman 4123011451 Siti Aisyah Binti Amat Jalani 4123013061
Risks to Data and Applications • Data primary concern because it is a unique resource. • Susceptible to • Disruption • Damage • Theft
Theft of Information and Identity Theft may be for identity theft, corporate espionage, etc. identity theft: using another person's credentials • Keystroke logging: record individual keystrokes • Social engineering: con artists pretending to be service people • Identity theft: pretending to be another person
Data Alteration, Data Destruction, and Web Defacement • Risk to data • Alteration : sometimes hard to notice. but can be very damaging • Destruction : usually very noticeable, and can be alleviated somewhat by having good backup procedures in place. • Web defacement : basically vandalism, similar to graffiti, but can cost businesses a lot in lost revenue • Deliberate alteration or destruction is a prank/mischief. • Target may be Web site
Data Alteration, Data Destruction, and Web Defacement(continued) • Honeytoken: fake record in networked database • Used to combat hackers • Honeypot: server containing mirrored copy of database • Educated security officers of vulnerable points
Computer Viruses, Worms, and Logic Bombs • Virus: spread from computer to computer • Worm: spread in network without human intervention • Antivirus software: protect against viruses • Trojan horse: virus disguised as legitimate software
Computer Viruses, Worms, and Logic Bombs (continued) • Logic bomb: cause damage at specific time. Usually planted by insiders. • Unintentional damage • Human error • Lack of adherence to backup procedures • Poor training • Unauthorized downloading may cause damage