100 likes | 213 Views
8. Protecting Information. Information Has 2 Roles. raw material part of a company’s product capital used to provide all products. Protecting Information. Information is threatened by component failure carelessness deliberate attacks. Hackers. white-hat hackers
E N D
8 Protecting Information
Information Has 2 Roles • raw material • part of a company’s product • capital • used to provide all products
Protecting Information • Information is threatened by • component failure • carelessness • deliberate attacks
Hackers • white-hat hackers • break in, don’t do damage • black-hat hackers • break in, cause trouble • crackers • break in for monetary gain • script bunnies • use software created by others
Most Common Types of Cyber Crime • virus: destructive software • macro virus attaches to application • worm spreads easily • denial-of-service • many e-businesses hit • can be disastrous
Security Plan • risk management • identification of risks or threats • implementation of security measures • monitoring plan for effectiveness
Risk Assessment • evaluate IT assets • what can go wrong? • how likely is it? • what are the consequences?
Safeguards • backups - ALWAYS • firewalls • encryption • security software
Disaster Recovery Plan • a plan of what you’ll do if disaster strikes • include consideration of • customers • facilities • knowledge workers • business information • computer equipment • communications infrastructure
Summary • many types of cyber crimes are perpetrated all over the world • organizations should have and use an effective security plan