0% found this document useful (0 votes)
5 views8 pages

Information Systems Security

Uploaded by

mackson kasanga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views8 pages

Information Systems Security

Uploaded by

mackson kasanga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Introduction to information system security

INTRODUCTION:
An information system (IS) is a collection of hardware, software, data, and
people that work together to collect, process, store, and disseminate
information. An IS can be used for a variety of purposes, such as supporting
business operations, decision making, and communication.
Information security refers to the protection of information and information
systems from unauthorized access, use, disclosure, disruption, modification, or
destruction. It aims to protect the confidentiality, integrity, and availability of
information and information systems.
 Information systems are vulnerable to a variety of security threats, such
as hackers, viruses, and natural disasters. As such, it is important for
organizations to implement appropriate security measures to protect their
information systems.
 There are several different security measures that organizations can
implement to protect their information systems, such as:
 Firewalls: Firewalls are used to restrict access to an organization’s
network and to protect against unauthorized access.
 Intrusion detection systems: These systems are used to detect and alert
organizations to potential security breaches.
 Encryption: Encryption is used to protect sensitive information by
converting it into unreadable code.
 Access controls: Access controls are used to restrict access to information
and information systems to authorized individuals only.
 Security policies: Organizations can implement security policies to ensure
that their employees understand their security responsibilities and adhere
to them.
 Security Auditing: Regularly monitoring the system for possible
malicious activities and vulnerabilities.
 By implementing these security measures, organizations can protect their
information systems from unauthorized access and use, and ensure that
their sensitive information is kept confidential and secure.
The Information System is an integrated set of the component for collecting,
storing, processing and communicating information. Business firm and other
organization on the information system to manage their operation in the
marketplace supply service and augment personals lives.

TYPES OF INFORMATION SSTEM:


Information systems are categorized based on their scope, purpose, and
functionality. Here are the main types of information systems:
Transaction Processing Systems (TPS): TPSs are used to process and record
transactions, such as sales, purchases, and payments. They are designed to
handle high volumes of transactions and are critical for the daily operations of
businesses.
Management Information Systems (MIS): MISs are used to provide
managers with the information they need to make decisions. They typically
provide reports and analysis on the performance of the organization, including
financial, operational, and marketing data.
Decision Support Systems (DSS): DSSs are used to support decision-making
by providing information and analysis to users. They use models and analytical
tools to analyze data and provide recommendations based on that analysis.
Executive Support Systems (ESS): ESSs are used to support the strategic
decision-making of senior executives. They provide high-level summaries of
data and analysis, typically in the form of dashboards and other visualizations.
Enterprise Resource Planning (ERP) Systems: ERPs are used to manage and
integrate all the business processes and data of an organization. They typically
include modules for finance, HR, inventory management, and other areas of the
business.
Customer Relationship Management (CRM) Systems: CRMs are used to
manage customer interactions and relationships. They provide a 360-degree
view of the customer, including their purchase history, preferences, and
feedback.
Supply Chain Management (SCM) Systems: SCMs are used to manage the
flow of goods and services from suppliers to customers. They include modules
for inventory management, logistics, and procurement.
Knowledge Management Systems (KMS): KMSs are used to capture, store,
and share knowledge and expertise within an organization. They include tools
for collaboration, content management, and search.
Geographic Information Systems (GIS): GISs are used to manage and
analyze spatial data. They are used in fields such as urban planning,
environmental management, and natural resource management.
Expert Systems (ES): ESs are used to provide expert-level advice and
decision-making in specific domains. They are typically based on rule-based or
knowledge-based systems.

SECURITY CHALLENGE:
The number of smart phone devices capable of offering internet technology and
experience rivalling desktop computer standards is growing at a fast pace.
Security and privacy concern for mobile devices rival or go beyond similar
concern for a laptop computer as mobile device are even more mobile by nature
and are less likely to be managed by an organization.
Ensure Security:
In order to ensure security, it is necessary to provide at least the following
services, which are given below.
1. Authorization:
It is act of determining whether an (authenticate) entity has the right to
execute action.

2. Audit:
An auditing service providing a history of action that can be used to
determine what (if anything) went wrong and what caused it to go
wrong.

3. Physical authentication:
Some firm of authentication such as an object (a key or a smart card ) or a
personal characteristic like a fingerprint, retinal pattern, hand geometry.
4. Data Confidentiality:
It protects against disclosure of any data while in transit and is provided
by encryption of data.

ADVANTAGES OR DISADVANTAGES:
Advantages of implementing information system and security include:
 Protection of sensitive information: By implementing security measures,
organizations can protect their sensitive information from unauthorized
access, use, disclosure, disruption, modification, or destruction.
 Compliance: Implementing information security can help organizations
meet compliance requirements, such as HIPAA, PCI-DSS, and SOX.
 Risk management: By implementing security measures, organizations can
better manage the risks associated with their information systems.
 Business continuity: By protecting information systems from natural
disasters, power outages and other disruptions, organizations can ensure
that their business operations can continue uninterrupted.
 Cost savings: Implementing security measures can help organizations
avoid costly data breaches and other security incidents.
Disadvantages of implementing information system and security include:
 Cost: Implementing security measures can be costly, as it may require
additional resources, such as security experts, to manage the process.
 Time-consuming: Implementing security measures can be time-
consuming, especially for organizations that have not previously used this
framework.
 Complexity: Implementing security measures can be complex, especially
for organizations that have a lot of data and systems to protect.
 Inflexibility: Security measures can be inflexible, making it difficult for
organizations to respond quickly to changing security needs.
 Limited Adaptability: Security measures are predefined, which is not
adaptable to new technologies, it may require updating or revising to
accommodate new technology.

COMMON IS ATTACKS
Cyberattacks are extremely costly for individuals and organizations who fall
victim to them. According to the FBI Internet Crime Report, in 2022,
cyberattacks caused a drastic $10.2 billion in losses [1]. With this number only
expected to increase in the coming years, cybercrime will continue to be a
significant concern.
As a result, cybersecurity roles that defend businesses against cyberattacks
continue to grow. In this article, we’ll explore cyberattacks, the various types to
look out for, and ways you can help protect yourself or your organization.
Afterward, if you're interested in exploring a career in cybersecurity, consider
enrolling in the Google Cybersecurity Professional Certificate, where you'll
learn how to identify common risks, threats, and vulnerabilities.
What is a cyberattack?
A cyberattack is an attempt to steal, alter, destroy, disrupt, or disable
information resources and systems found in computer networks and
systems. Cyberattacks can fit into two categories: insider threats or outsider
threats. Insider threats stem from individuals with legitimate access to the
systems they target, using their access to exploit vulnerabilities intentionally or
inadvertently. They could be committed by a dissatisfied or angry employee or a
contractor with access to the organization’s systems. An outsider threat is from
someone who doesn’t have any affiliation with the system they’re attacking,
such as criminal organizations or hackers.
Who do cyberattackers target?
Cyberattackers commonly target industries, including health care, government,
non-profits, and finance companies. The health care industry has been
especially susceptible to attack because health care organizations have access to
many people's personal data. Since health care infrastructure is so critical,
ransomware attackers understand that these organizations will likely pay their
demands quickly.
Confidential information, such as social security numbers, cause government
organizations to fall victim to hackers as well. Nonprofits are unique in that they
possess financial data from donors and fundraising efforts, making them ideal
targets for cyberattacks. In the finance industry, institutions like banks and
insurance companies are common targets for extortion and theft due to their
access to significant amounts of money.
Common types of cyberattacks
N/B: TALK OF ETHICAL HACKERS

Cyberattacks can have motives other than financial gain. Some cyberattacks
focus on destroying or gaining access to critical data.
Organizations and individuals face the following types of typical cyberattacks:
1. Malware
Cyberattackers use harmful software such as spyware, viruses, ransomware,
and worms known as malware to access your system's data. When you click on
a malicious attachment or link, the malware can install itself and become active
on your device.
2. Phishing - ///phone calls
Phishing attacks rely on communication methods like email to convince you to
open the message and follow the instructions inside. If you follow the
attackers’ instructions, they gain access to personal data, such as credit
cards, and can install malware on your device.
3. Spoofing
Cyber attackers will sometimes imitate people or companies to trick you into
giving up personal information. This can happen in different ways. A common
spoofing strategy involves using a fake caller ID, where the person receiving
the call doesn’t see that the number is falsified. Other spoofing methods include
subverting facial recognition systems, using a fake domain name, or creating a
fake website.
4. Backdoor Trojan
Backdoor Trojan attacks involve malicious programs that can deceptively
install malware or data and open up what’s referred to as the “backdoor” to
your computer system. When attackers gain access to the backdoor, they can
hijack the device without it being known to the user.
5. Ransomware
Ransomware is malicious software that cyberattacks can install on your
device, allowing them to block your access until you pay the attackers a
ransom. However, paying the ransom doesn’t guarantee the removal of the
software, so experts often advise individuals not to pay the ransom if possible.
6. Password attacks
Password attacks can be as simple as someone correctly guessing your
password or other methods such as keylogging, where attackers can monitor the
information you type and then identify passwords. An attacker can also use the
aforementioned phishing approach to masquerade as a trusted site and try to
fool you into revealing your account credentials.
7. Internet of Things attack
Communication channels between connected IoT components can be
susceptible to cyberattacks and the applications and software found on IoT
devices. Since IoT devices are in connection with one another through the
internet and may have limited security features, there is a larger attack surface
that attackers can target.
8. Cryptojacking
Cryptojacking involves gaining unauthorized use of a computer system,
usually through malware that allows the attacker to use the computer's resources
for mining cryptocurrency. Mining cryptocurrency can come with significant
operational costs, so cryptojacking provides attackers with a way to avoid these
expenses.
9. Drive-by download
Drive-by download attacks occur when you download malicious code to
your device through an app, website, or operating system with flawed security
systems. This means you could do nothing wrong and still be a victim of a
drive-by download since it can occur due to a lack of security measures on a site
you believe to be safe.
10. Denial-of-service attack
A denial-of-service attack causes an entire device or operating system to shut
down by overwhelming it with traffic, causing it to crash. Attackers don’t often
use this method to steal information. Instead, it costs the victim time and money
to get their systems up and running again. Cybercriminals typically use this
method when the target is a trade organization or government entity.

How to prevent cyberattacks


An important first step in preventing cyberattacks is ensuring you and other
employees at your organization know of the potential of cyberattacks. Being
mindful before clicking links and checking the email address to ensure it
appears legitimate can go a long way in ensuring your data and systems are kept
safe.

Here are some useful tips to prevent cyberattacks:


Update your software.
Up-to-date software systems are more resilient than outdated versions, which
may be prone to having weaknesses. Updates can correct any flaws and
weaknesses in the software, so having the latest version is optimal. Additionally,
consider keeping software systems updated by investing in a patch management
system.
Install a firewall.
Firewalls are helpful in preventing a variety of attacks, such as backdoors and
denial-of-service attacks. They work by controlling the network traffic moving
through your system. A firewall will also stop any suspicious activity it deems
potentially harmful to the computer.
Back up data.
When you back up data, you move it to a different, secure location for storage.
This might involve using cloud storage or a physical device like a hard drive. In
case of an attack, backing up your data allows you to recover any lost data.
Encrypt data.
Data encryption is a popular way to prevent cyberattacks, and it ensures data is
only accessible to those who have the decryption key. To successfully attack
encrypted data, attackers often have to rely on the brute force method of trying
different keys until they can guess the right one, making breaking the encryption
challenging.
Use strong passwords.
You should have strong passwords to prevent attacks and avoid using the same
passwords for different accounts and systems. Using the same password
repeatedly increases the risk of giving attackers access to all your information.
Regularly updating your passwords and using passwords that combine special
characters, upper and lowercase letters, and numbers can help protect your
accounts.
Develop cybersecurity skills on Coursera
Develop the skills you need for an in-demand role in cybersecurity with a
Professional Certificate from industry leaders. The Google Cybersecurity
Professional Certificate is eight courses. In that time, you'll learn how to protect
networks, devices, people, and data from unauthorized access and cyberattacks
using Security Information and Event Management (SIEM) tools.

You might also like