SlideShare a Scribd company logo
1 of 13
THREATS
TO
INFORMATION
RESOURCES
Shimna K
3rd Sem MBA
CMS
Information Systems (IS)
An information system(IS) is typically considered to be a set of
interrelated elements or components that
collect(input), manipulate(processes), and disseminate (output)
data and information and provide a feedback mechanism to meet
an objective.

Information Systems Security
It refers to the policies, procedures, and technical measures
adopted to prevent potential threats to IS resources.
IS Security Threats
A threat to an information resource is any danger
to which a system may be exposed.
•
•
•
•
•
•

Human errors or failures
Manipulation of data/systems
Theft of data/system
Destruction from virus
Technical; failure/errors of systems
Natural disasters like
flood, fire, earthquake, etc
1. Human Errors or Failures
Unintentional errors
Entry of wrong data
Accidental deletion
Modification of data
Storage of data in unprotected areas like desktop, website, trash bin
Disclosing of confidential data
These errors may happen because of;

Lack of experience
Improper training
2. Manipulation of data/systems
This category of threats happens because of Deliberate
acts to harm the data or IS of an organization.
An unauthorized individual gains an access to the
private/confidential or important data of an organization.
Intentionally do some wrong acts like delete, corrupt or
steal the data.
3. Theft of data/systems
It is a deliberate attempt of some person to steal the
important data of an organization.
Thieves may steal physical items like entire pc, circuit
boards & memory chips, the theft of electronic data pose
a greater challenge.
Telecommunication networks are highly misused by
computer experts.
The person who intercepts the communication lines to
steal data without the knowledge of the owner of the
data is known as hacker.
4. Destruction from virus
Deliberate software attack

This kind of attack happens when a person or a group write
software to attack data or IS of and organization with the
purpose to damage, destroy, or deny service to the target
systems.
The programme which is written with an intent to attack
data or IS is known as malicious code or malicious
software or malware.
Eg: viruses and worms, Trojan horses, logic-bombs etc.
The computer viruses are the secret instructions inserted into
programs or data that run during ordinary tasks. The secret
instructions may destroy or alter data as well as spread within or
between computer systems.

Worms refers to a program which replicates itself constantly
and penetrates a valid computer system.
Trojan horses refers to illegal programs contained within
another useful or beneficial program, that hide their true nature
or sleeps until some specific event occurs hen triggers the
illegal program becomes infected which is not known to
the user. Many viruses can be hidden in Trojan horses,
but Trojan horses do no have the ability to replicate
themselves.
Logic bombs or time bomb is a kind of programme that executes
when certain conditions are met. It is similar to Trojan horse in its
ability to damage data but it activates at a particular time.
5. Technical failure/ errors of systems
Manufacturing defects in the hardware or the hidden faults in the
software.
Unique combinations of certain software and hardware may give
new errors.
Technological obsolescence.
6. Natural disasters
Not because of unintentional or deliberate acts.
Threats include fire, flood, earthquake, lightning etc.
REFERENCE
MIS, DP GOYAL
INTERNET
Threats to Information Resources - MIS - Shimna

More Related Content

What's hot

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Business information system with explaination
Business information system with explainationBusiness information system with explaination
Business information system with explainationAlana Abraham
 
Erp & e commerce
Erp & e commerceErp & e commerce
Erp & e commerceAli Mcc
 
DATA WAREHOUSING
DATA WAREHOUSINGDATA WAREHOUSING
DATA WAREHOUSINGKing Julian
 
Introduction to erp system
Introduction to erp systemIntroduction to erp system
Introduction to erp systemshalomjudit3
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systemsBimbashree K.G
 
Enterprise Resource Planning(ERP)
Enterprise Resource Planning(ERP)Enterprise Resource Planning(ERP)
Enterprise Resource Planning(ERP)Makan Singh
 
Enterprise Resource Planning Unit 4 post implementation on ERP
Enterprise Resource Planning Unit 4 post implementation on ERPEnterprise Resource Planning Unit 4 post implementation on ERP
Enterprise Resource Planning Unit 4 post implementation on ERPGanesha Pandian
 
Computer Security PowerPoint Presentation Slides
Computer Security PowerPoint Presentation SlidesComputer Security PowerPoint Presentation Slides
Computer Security PowerPoint Presentation SlidesSlideTeam
 
Office Automation System (OAS)
Office Automation System (OAS)Office Automation System (OAS)
Office Automation System (OAS)Jaisha Jaikishan
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information systemRohit Kumar
 
Information system for strategic advantage
Information system for strategic advantageInformation system for strategic advantage
Information system for strategic advantageHarmanjeet Kaur
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityarun alfie
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing systemanjana1994
 

What's hot (20)

Social and ethical issues in commerce
Social and ethical issues in commerceSocial and ethical issues in commerce
Social and ethical issues in commerce
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Business information system with explaination
Business information system with explainationBusiness information system with explaination
Business information system with explaination
 
Erp & e commerce
Erp & e commerceErp & e commerce
Erp & e commerce
 
DATA WAREHOUSING
DATA WAREHOUSINGDATA WAREHOUSING
DATA WAREHOUSING
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Mis notes
Mis notesMis notes
Mis notes
 
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
 
Introduction to erp system
Introduction to erp systemIntroduction to erp system
Introduction to erp system
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systems
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
Enterprise Resource Planning(ERP)
Enterprise Resource Planning(ERP)Enterprise Resource Planning(ERP)
Enterprise Resource Planning(ERP)
 
Enterprise Resource Planning Unit 4 post implementation on ERP
Enterprise Resource Planning Unit 4 post implementation on ERPEnterprise Resource Planning Unit 4 post implementation on ERP
Enterprise Resource Planning Unit 4 post implementation on ERP
 
Computer Security PowerPoint Presentation Slides
Computer Security PowerPoint Presentation SlidesComputer Security PowerPoint Presentation Slides
Computer Security PowerPoint Presentation Slides
 
Office Automation System (OAS)
Office Automation System (OAS)Office Automation System (OAS)
Office Automation System (OAS)
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information system
 
Information system for strategic advantage
Information system for strategic advantageInformation system for strategic advantage
Information system for strategic advantage
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 

Viewers also liked

Viewers also liked (19)

Top 10 Reasons for ERP Project Failure
Top 10 Reasons for ERP Project FailureTop 10 Reasons for ERP Project Failure
Top 10 Reasons for ERP Project Failure
 
ERP and MIS
ERP and MISERP and MIS
ERP and MIS
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Erp benefits
Erp benefitsErp benefits
Erp benefits
 
Chapter 6 Mis And Erp
Chapter 6 Mis And ErpChapter 6 Mis And Erp
Chapter 6 Mis And Erp
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Customer relationship management in mis ppt
Customer relationship management in mis pptCustomer relationship management in mis ppt
Customer relationship management in mis ppt
 
MIS 13 Customer Relationship Management
MIS 13 Customer Relationship ManagementMIS 13 Customer Relationship Management
MIS 13 Customer Relationship Management
 
DATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MININGDATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MINING
 
OLAP
OLAPOLAP
OLAP
 
Warehousing
WarehousingWarehousing
Warehousing
 
CRM with MIS
CRM with MISCRM with MIS
CRM with MIS
 
Porter's Value Chain Presentation 1
Porter's Value Chain Presentation 1Porter's Value Chain Presentation 1
Porter's Value Chain Presentation 1
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Basics of Supply Chain Managment
Basics of Supply Chain ManagmentBasics of Supply Chain Managment
Basics of Supply Chain Managment
 
Customer Relationship Management (CRM)
Customer Relationship Management (CRM)Customer Relationship Management (CRM)
Customer Relationship Management (CRM)
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain Management
 
Value chain analysis
Value chain analysisValue chain analysis
Value chain analysis
 

Similar to Threats to Information Resources - MIS - Shimna

Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityAliyuMuhammadButu
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
Health information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskHealth information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskDr. Lasantha Ranwala
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Komal Mehfooz
 
Threat vs risk vs attack vs Asset vs vulnerability
Threat vs risk vs attack vs Asset vs  vulnerability Threat vs risk vs attack vs Asset vs  vulnerability
Threat vs risk vs attack vs Asset vs vulnerability Osama Ellahi
 
Cyber security
Cyber securityCyber security
Cyber securitygogulraj25
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Computer Threat.pdf
Computer Threat.pdfComputer Threat.pdf
Computer Threat.pdfZaraFatima29
 

Similar to Threats to Information Resources - MIS - Shimna (20)

Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
Need for security
Need for securityNeed for security
Need for security
 
Computer security
Computer securityComputer security
Computer security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
System tThreats
System tThreatsSystem tThreats
System tThreats
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Health information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskHealth information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and risk
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Threat vs risk vs attack vs Asset vs vulnerability
Threat vs risk vs attack vs Asset vs  vulnerability Threat vs risk vs attack vs Asset vs  vulnerability
Threat vs risk vs attack vs Asset vs vulnerability
 
Cyber security
Cyber securityCyber security
Cyber security
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Computer Threat.pdf
Computer Threat.pdfComputer Threat.pdf
Computer Threat.pdf
 

Recently uploaded

Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 

Recently uploaded (20)

Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 

Threats to Information Resources - MIS - Shimna

  • 2. Information Systems (IS) An information system(IS) is typically considered to be a set of interrelated elements or components that collect(input), manipulate(processes), and disseminate (output) data and information and provide a feedback mechanism to meet an objective. Information Systems Security It refers to the policies, procedures, and technical measures adopted to prevent potential threats to IS resources.
  • 3. IS Security Threats A threat to an information resource is any danger to which a system may be exposed. • • • • • • Human errors or failures Manipulation of data/systems Theft of data/system Destruction from virus Technical; failure/errors of systems Natural disasters like flood, fire, earthquake, etc
  • 4. 1. Human Errors or Failures Unintentional errors Entry of wrong data Accidental deletion Modification of data Storage of data in unprotected areas like desktop, website, trash bin Disclosing of confidential data These errors may happen because of; Lack of experience Improper training
  • 5. 2. Manipulation of data/systems This category of threats happens because of Deliberate acts to harm the data or IS of an organization. An unauthorized individual gains an access to the private/confidential or important data of an organization. Intentionally do some wrong acts like delete, corrupt or steal the data.
  • 6. 3. Theft of data/systems It is a deliberate attempt of some person to steal the important data of an organization. Thieves may steal physical items like entire pc, circuit boards & memory chips, the theft of electronic data pose a greater challenge. Telecommunication networks are highly misused by computer experts. The person who intercepts the communication lines to steal data without the knowledge of the owner of the data is known as hacker.
  • 7. 4. Destruction from virus Deliberate software attack This kind of attack happens when a person or a group write software to attack data or IS of and organization with the purpose to damage, destroy, or deny service to the target systems. The programme which is written with an intent to attack data or IS is known as malicious code or malicious software or malware. Eg: viruses and worms, Trojan horses, logic-bombs etc.
  • 8. The computer viruses are the secret instructions inserted into programs or data that run during ordinary tasks. The secret instructions may destroy or alter data as well as spread within or between computer systems. Worms refers to a program which replicates itself constantly and penetrates a valid computer system. Trojan horses refers to illegal programs contained within another useful or beneficial program, that hide their true nature or sleeps until some specific event occurs hen triggers the illegal program becomes infected which is not known to the user. Many viruses can be hidden in Trojan horses, but Trojan horses do no have the ability to replicate themselves.
  • 9. Logic bombs or time bomb is a kind of programme that executes when certain conditions are met. It is similar to Trojan horse in its ability to damage data but it activates at a particular time.
  • 10. 5. Technical failure/ errors of systems Manufacturing defects in the hardware or the hidden faults in the software. Unique combinations of certain software and hardware may give new errors. Technological obsolescence.
  • 11. 6. Natural disasters Not because of unintentional or deliberate acts. Threats include fire, flood, earthquake, lightning etc.