Infographic Template Galleries

Created with Fabric.js 1.4.5 Three Most Common Sources of Threats Managing Information Security 18% 6% 40% 36% Human Error 50% Malicious Activity Natural Disaster A Guide to Hacker Slang By: Jessica Foley and Jessica Pieroni Accidental mistakes such as installing an old database on top of the current one Act of nature (fire and hurricane) that result in the initial loss of capability and service Type Of Hackers black hat (unethical) white hat (ethical) pretexting/ phishing (pretending to be someone who you are not), Sniffing (technique for intercepting computer communications), Hacking (breaking into computers) Unauthorized Data Disclosure Tampering with functionally of system denial of service (flooding server with more requests than it can handle to stop system from working), fuzzing (inputting random data to make a system crash) Corrupt Computer Technology Three Components of a Good Security Program Senior management must establish a security policy Types of Safeguards Responding to security incidents Every organization must have a disaster preparedness and recovery plan Unauthorized data disclosure threats that results from employees and hackers who intentionally destroy data or system components Virus (spreads from computer to computer stealing information), Trojan Horse (virus that masquerades as useful programs or files),Worm (virus that propagates using the internet), Spyware (programs installed on users computer without their permission), Adware (watches user activity and produces pop-up ads) And manage risks Human: involve people and procedure components of information systems. Result when authorized users follow appropriate procedures for system use and recovery Technical: involve the hardware and software components of an information system (identification and authorization, firewalls, malware protection, application design) Data: protect databases and other organizational data (data rights and responsibilities, passwords, backup and recovery, physical security) The major factors: Have a plan in place! Centralized reporting (enables an organization to determine if it is under systematic attack Specific responses (Speed, Preparation pays, Don't make the problem worse)Practice! An organization can have a plan in place but if they don't practice it and make sure it works then it is pointless This will state the organization's posture regarding data that it gathers about its customers, suppliers, partners and employees. Policy should stimulate: sensitive data that will be stored, how it will process the data, if it will be shared, how it canbe obtained, how the data can be changed Proactively balance the trade-off between risk and cost Software Hacking A bot, bot net and bot herder all take advantage of the computer software. A bot is a software program that acts if they are a human after they get ahold of the computer software. A bot net infects multiple computer software allowing the bot herder to take control and further infect the software. A bot herder is able to perform activities such as spam emails.
Create Your Free Infographic!