Infographic Template Galleries

Created with Fabric.js 1.4.5 Loss of territories - productive land,industries and raw resources Components of a Security Program Information Security Management The purpose of security managementis to ensure and safeguard sensitiveinformation from possible threats. Threat Any entity or eventthat has the potentialto access or harm aninformation system. 1. Human Error2. Natural Disaster3. Malicious Activity Computer Security Threats Preventable * Pretexting/Phishing* Sniffing* Hacking * White Hat* Black Hat * Denial of Service* Fuzzing * Virus* Trojan Horse* Worm* Spyware* Adware * Bot/Bot Net/Bot Herder when hackers input lots of random data in an attemptto make a system crash. Using false input prompts to trickuser into entering sensitive information Computer program that copies itself to othercomputers and steals sensitive information Virus that infects networks rather thanindividual computers Disguises itself as a harmless program Unethical hacker who hacks for malicious purposes Gradually capturing network information over timeby capturing small packets of data Using software to access sensitive information Program that remotely accessesa computer system as a user Collects sensitive information and sends to hacker Malware that automatically induces advertisement-related software to a computer Attempts to overload a system to make itinaccessible to users The three most commonforms of threats toinformation systems: Types of Malware Ethical hacker who tests a system's security Types of Hacker Types of System Attacks Autonomous Hacks Autonomous Access Hacks 2. Safeguards Senior management must establisha security policy and manage risks Prevention 1. Security Policy * Human* Technical* Data 3. Security Monitoring Security measures must be maintained andupdated constantly. Responding to Threats Every organization should have a backup planfor recovering information. Patrick Kent(Created in
Create Your Free Infographic!