Presentation MIS
Presentation MIS
Presentation MIS
INFORMATION SYSTEM
Cyber security
Cyber security is the body of technologies,
processes and practices designed to protect
network, computer, programs and data from
atacak, damage, or unauthorized
Cyber crime
• Cyber crime encompasses any criminal act
dealing with computers and network (called
hacking). Additionally, cyber crime also
includes traditional crimes conducted through
the internet.
threats
• A threat is any potential danger to information
and systems
• 3 levels of cyber threats
- Unsturctured
- Structured
- Highly structured
Unstructured threats
• Individual/small group winth little or no
organization or funding
• Easily detectable information gathering
• Exploitations based upon documented flaws
• Targets of opportunity
• Gain control of machines
• Motivated by bragging right, thrills, access to
resources
Structured threats
• Well organized, planned and funded
• Specific targets and extensive information
gathering to choose avenue and means of attack
• Goal-data stored on machines or machines
themselves
• Exploitation may rely on insider help of unknown
flaw
• Target drives attack
• Organized crime/ black hat hackers
Highly structured threat
• Extensive organization, funding and planning over
an extended rime, with goal of having an effect
beyond the data or machine being attacked
• Stealthy information gathering
• Multiple attacks exploiting unknown flaws or
insider help
• Coordinated efforts from multiple groups
• “cyber warfare”
Categories of Cyber Crime
• The computer as a target : using a computer
to attacks other computer
Example: hacking, virus/worms attack, do’s
attack etc.
• The computer as a weapon : using a computer
to commit real world crime
Example: cyber terrorism, credit card fraud, etc
Cyber Crime Variants
• Hacking
“Hacking” is a crime, which entails cracking
systems and gaining unauthorized access to data
stored in them.
• Cyber squatting
• Cyber squatting is the act of registering a
famous domain naname and then selling it for
a fortune.
Phising
• Phising is just one of the many frauds on the
internet, trying to fool people into parting
with their money. Phising refers to receipt of
unsolicited emails by custumers of Financial
Institutions, requesting them to enter their
username, password or other personal
information to access their account for some
reason.
Cyber Stalking
• Cyber stalking is use of the internet or other
electronic means to stalk someone. This term
is used interchangeably with online
harassment and online abuse.
Vishing
• Is the criminal practice of using social
engineering and voice over IP to gain access to
private personal and financial information
from the public for the purpose of financial
reward. Vishing exploits the publics’s trust in
landline telephone service.
Classification of Information Security System