Infographic Template Galleries

Created with Fabric.js 1.4.5 Managing Information Security Three Most Common Sources of Threats 50% - Human Error Natural Disasters > Earthquakes, Fires, Floods, Riots, etc. Purposely Malicious Activity Hacker Slanguage Hacker type Information Acquisition Strategies Programs Overloading Automated Hacking White Hat: Ethical HackerBlack Hat: Selfish, 'Evil' Hackers Phishing: Stealing information by pretending to be a trustworthy sourceSniffing: Determine the web browser a visitor is usingHacking: Using a computer to gain unauthorized access to data in a system. Denial of Service: Making a network unavailable to its intended users.Fuzzing: Technique used to test for holes/problems in security system Virus: Program that infects computers by replicating to achieve sinister goalTrojan Horse: Program that enters computer then creates backdoor for hacker to useWorm: Self-replicating program that infects computers using a network. Similar to virus, but does not need to attach itself to existing program to spread.Spyware: Program that secretly gathers information about a person/organization.Adware: Program that automatically creates ads in order to generate revenue. Bot: Software application that runs automated tasks over the Internet. Bot Net: Collection of bots that come together to complete Internet tasksBot Herder: Hackers who use automated techniques to find vulnerable systems Good Security Measures Management should make security policy to create solutions to problems before they arise. Three Main Components 1. Technical Safeguards > ID/Authorization codes > Data Encryption > Firewalls > Malware Protection * Antivirus software up-to-date * Don't open strange emails/attacthments 2. Data Safeguards > Passwords > Data Encryption > Backup files > Physical Security Measures > Data Rights & Responsibilities 3. Human Safeguards > Hiring Personnel > Training Employees > Education > Administration Team > Accountability & Compliance > Procedure Design > Data Assessments The Response? Emergency disaster &recovery plan is a MUST! Practice it! Backup Facilities IdentifyMission-critical Systems Other 50%
Create Your Free Infographic!