Threats to Information Security

Threats to Information Security

Threats to Information Security:- “The term information security refers to the way of protecting information systems and the information stored in it from the unauthorized access, use, modification, disclosure, or disruption.”

Information security is the process of ensuring and maintaining confidentiality, availability, and integrity of data. Confidentiality refers to the protection of information from unauthorized access.

The information is disclosed only to those who are authorized to access it. Integrity refers to the assurance that information is trustworthy, accurate and genuine. It protects the information from unauthorized modification.

Availability means only authorized users should be able to access the information whenever needed. It ensures the timely access to data whenever it is needed by the authorized users.

Information is a valuable asset because we are living in an information society and all the activities either personal or professional are dependent on information.

So, protection of information against unauthorized access is a major part of information security.

 

Sources of Threats to Information Security

Sources of threats to information security can be grouped into two basic categories:

  1. Internal Sources
  2. External Sources

 

I. Internal Sources

Information security threats can emerge from the internal sources of an organization. These sources may commit computer fraud by making unauthorized access to the information for their own benefits, thereby causing a threat to the security of the information.

Following are the internal sources of threat to information security:

  1. Input
  2. Processor
  3. Computer Information
  4. Stored Data
  5. Output

 

1. Input

Input frauds can be committed at the level of input. It is the simplest and most common way of committing fraud. By changing the input, a perpetrator can commit different types of computer frauds such as disbursement of frauds in fake names, alteration of bank account balances, etc.

 

2. Processor

Computer frauds can be committed through an unauthorized system use, including the theft of computer time and services. The employees may use computer time for their own benefits for which they have not been authorized.

 

3. Computer Information

Computer frauds can be committed by tempering software that processes data. It may involve modifying the software, making its illegal copies, or using it in an unauthorized manner.

 

4. Stored Data

Computer frauds can be committed by altering stored data in an unauthorized way or retrieving sensitive data and passing this data to others at a price.

 

5. Output

Computer frauds can be committed by stealing or misusing computer system output. Output can be either displayed on monitors or printed on paper.

 

II. External Sources

Information security threats can also emerge from the sources external to an organization. These sources can damage the information by having unauthorized access to the stand-alone computer systems or the systems that are linked through a computer network, particularly the Internet.

External sources may commit computer frauds through the removal of information, destruction of system confidentiality, integrity, and availability, interferences with web pages, interception of electronic mails, interception of electronic data transfer, interception of electronic payments and transmission of malicious software such as viruses, worms etc.

 

Various types of external threats are:

  1. Computer Viruses
  2. Internet Frauds

 

1. Computer Viruses

A computer virus is a software code that replicates itself and corrupts information simultaneously. Most viruses work silently so that the user is unaware of the infection.

It is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions. After entering a computer, a virus attaches of the host program triggers the action of the virus simultaneously.

It can self-replicate, inserting itself onto other programs or files, infecting them in the process. When this replication succeeds, the affected areas are ten said to be “infected” with a computer virus.

 

2. Internet Frauds

Hacking:  Hacking refers to gaining access to confidential websites and data through the intention may not be malicious.

Cracking: Cracking is used to have access to confidential websites with malicious intentions.

E-mail Forger: Sending e-mail, which is fake and appears to be sent by someone else.

E-mail Threats: Sending threatening e-mail forcing the recipient to do something beneficial to the sender.

Misinformation: Sending misleading information ok the subject of wider importance.

 

Related Post

Economic Consequences of Cyber Terrorism

Terrorist Atrocities

Role of Information Technology for Terrorists

Types of Cyber Terrorism – Privacy Violation

Characteristics of Cyber Terrorism

What is Cyber Terrorism? Factors of Cyber Terrorism

No Comments

Leave a Comment

Copyright©2019-SolutionWeb.in-All Rights Reserved. |About Us | Contact Us | Disclaimer | Privacy Policy ||