Information Systems Security
Information Systems Security
INTRODUCTION:
An information system (IS) is a collection of hardware, software, data, and
people that work together to collect, process, store, and disseminate
information. An IS can be used for a variety of purposes, such as supporting
business operations, decision making, and communication.
Information security refers to the protection of information and information
systems from unauthorized access, use, disclosure, disruption, modification, or
destruction. It aims to protect the confidentiality, integrity, and availability of
information and information systems.
Information systems are vulnerable to a variety of security threats, such
as hackers, viruses, and natural disasters. As such, it is important for
organizations to implement appropriate security measures to protect their
information systems.
There are several different security measures that organizations can
implement to protect their information systems, such as:
Firewalls: Firewalls are used to restrict access to an organization’s
network and to protect against unauthorized access.
Intrusion detection systems: These systems are used to detect and alert
organizations to potential security breaches.
Encryption: Encryption is used to protect sensitive information by
converting it into unreadable code.
Access controls: Access controls are used to restrict access to information
and information systems to authorized individuals only.
Security policies: Organizations can implement security policies to ensure
that their employees understand their security responsibilities and adhere
to them.
Security Auditing: Regularly monitoring the system for possible
malicious activities and vulnerabilities.
By implementing these security measures, organizations can protect their
information systems from unauthorized access and use, and ensure that
their sensitive information is kept confidential and secure.
The Information System is an integrated set of the component for collecting,
storing, processing and communicating information. Business firm and other
organization on the information system to manage their operation in the
marketplace supply service and augment personals lives.
SECURITY CHALLENGE:
The number of smart phone devices capable of offering internet technology and
experience rivalling desktop computer standards is growing at a fast pace.
Security and privacy concern for mobile devices rival or go beyond similar
concern for a laptop computer as mobile device are even more mobile by nature
and are less likely to be managed by an organization.
Ensure Security:
In order to ensure security, it is necessary to provide at least the following
services, which are given below.
1. Authorization:
It is act of determining whether an (authenticate) entity has the right to
execute action.
2. Audit:
An auditing service providing a history of action that can be used to
determine what (if anything) went wrong and what caused it to go
wrong.
3. Physical authentication:
Some firm of authentication such as an object (a key or a smart card ) or a
personal characteristic like a fingerprint, retinal pattern, hand geometry.
4. Data Confidentiality:
It protects against disclosure of any data while in transit and is provided
by encryption of data.
ADVANTAGES OR DISADVANTAGES:
Advantages of implementing information system and security include:
Protection of sensitive information: By implementing security measures,
organizations can protect their sensitive information from unauthorized
access, use, disclosure, disruption, modification, or destruction.
Compliance: Implementing information security can help organizations
meet compliance requirements, such as HIPAA, PCI-DSS, and SOX.
Risk management: By implementing security measures, organizations can
better manage the risks associated with their information systems.
Business continuity: By protecting information systems from natural
disasters, power outages and other disruptions, organizations can ensure
that their business operations can continue uninterrupted.
Cost savings: Implementing security measures can help organizations
avoid costly data breaches and other security incidents.
Disadvantages of implementing information system and security include:
Cost: Implementing security measures can be costly, as it may require
additional resources, such as security experts, to manage the process.
Time-consuming: Implementing security measures can be time-
consuming, especially for organizations that have not previously used this
framework.
Complexity: Implementing security measures can be complex, especially
for organizations that have a lot of data and systems to protect.
Inflexibility: Security measures can be inflexible, making it difficult for
organizations to respond quickly to changing security needs.
Limited Adaptability: Security measures are predefined, which is not
adaptable to new technologies, it may require updating or revising to
accommodate new technology.
COMMON IS ATTACKS
Cyberattacks are extremely costly for individuals and organizations who fall
victim to them. According to the FBI Internet Crime Report, in 2022,
cyberattacks caused a drastic $10.2 billion in losses [1]. With this number only
expected to increase in the coming years, cybercrime will continue to be a
significant concern.
As a result, cybersecurity roles that defend businesses against cyberattacks
continue to grow. In this article, we’ll explore cyberattacks, the various types to
look out for, and ways you can help protect yourself or your organization.
Afterward, if you're interested in exploring a career in cybersecurity, consider
enrolling in the Google Cybersecurity Professional Certificate, where you'll
learn how to identify common risks, threats, and vulnerabilities.
What is a cyberattack?
A cyberattack is an attempt to steal, alter, destroy, disrupt, or disable
information resources and systems found in computer networks and
systems. Cyberattacks can fit into two categories: insider threats or outsider
threats. Insider threats stem from individuals with legitimate access to the
systems they target, using their access to exploit vulnerabilities intentionally or
inadvertently. They could be committed by a dissatisfied or angry employee or a
contractor with access to the organization’s systems. An outsider threat is from
someone who doesn’t have any affiliation with the system they’re attacking,
such as criminal organizations or hackers.
Who do cyberattackers target?
Cyberattackers commonly target industries, including health care, government,
non-profits, and finance companies. The health care industry has been
especially susceptible to attack because health care organizations have access to
many people's personal data. Since health care infrastructure is so critical,
ransomware attackers understand that these organizations will likely pay their
demands quickly.
Confidential information, such as social security numbers, cause government
organizations to fall victim to hackers as well. Nonprofits are unique in that they
possess financial data from donors and fundraising efforts, making them ideal
targets for cyberattacks. In the finance industry, institutions like banks and
insurance companies are common targets for extortion and theft due to their
access to significant amounts of money.
Common types of cyberattacks
N/B: TALK OF ETHICAL HACKERS
Cyberattacks can have motives other than financial gain. Some cyberattacks
focus on destroying or gaining access to critical data.
Organizations and individuals face the following types of typical cyberattacks:
1. Malware
Cyberattackers use harmful software such as spyware, viruses, ransomware,
and worms known as malware to access your system's data. When you click on
a malicious attachment or link, the malware can install itself and become active
on your device.
2. Phishing - ///phone calls
Phishing attacks rely on communication methods like email to convince you to
open the message and follow the instructions inside. If you follow the
attackers’ instructions, they gain access to personal data, such as credit
cards, and can install malware on your device.
3. Spoofing
Cyber attackers will sometimes imitate people or companies to trick you into
giving up personal information. This can happen in different ways. A common
spoofing strategy involves using a fake caller ID, where the person receiving
the call doesn’t see that the number is falsified. Other spoofing methods include
subverting facial recognition systems, using a fake domain name, or creating a
fake website.
4. Backdoor Trojan
Backdoor Trojan attacks involve malicious programs that can deceptively
install malware or data and open up what’s referred to as the “backdoor” to
your computer system. When attackers gain access to the backdoor, they can
hijack the device without it being known to the user.
5. Ransomware
Ransomware is malicious software that cyberattacks can install on your
device, allowing them to block your access until you pay the attackers a
ransom. However, paying the ransom doesn’t guarantee the removal of the
software, so experts often advise individuals not to pay the ransom if possible.
6. Password attacks
Password attacks can be as simple as someone correctly guessing your
password or other methods such as keylogging, where attackers can monitor the
information you type and then identify passwords. An attacker can also use the
aforementioned phishing approach to masquerade as a trusted site and try to
fool you into revealing your account credentials.
7. Internet of Things attack
Communication channels between connected IoT components can be
susceptible to cyberattacks and the applications and software found on IoT
devices. Since IoT devices are in connection with one another through the
internet and may have limited security features, there is a larger attack surface
that attackers can target.
8. Cryptojacking
Cryptojacking involves gaining unauthorized use of a computer system,
usually through malware that allows the attacker to use the computer's resources
for mining cryptocurrency. Mining cryptocurrency can come with significant
operational costs, so cryptojacking provides attackers with a way to avoid these
expenses.
9. Drive-by download
Drive-by download attacks occur when you download malicious code to
your device through an app, website, or operating system with flawed security
systems. This means you could do nothing wrong and still be a victim of a
drive-by download since it can occur due to a lack of security measures on a site
you believe to be safe.
10. Denial-of-service attack
A denial-of-service attack causes an entire device or operating system to shut
down by overwhelming it with traffic, causing it to crash. Attackers don’t often
use this method to steal information. Instead, it costs the victim time and money
to get their systems up and running again. Cybercriminals typically use this
method when the target is a trade organization or government entity.