Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
FP611: ISS (2)
Transcript of FP611: ISS (2)
Identify potential risk of internet services.
Distinguish security threats by category and activities Identify internet services that have potential risks. The Risks Categories Security Threats What are the future road map in handling information system security issues? Your Opinion e-Mail
File Transfer Activities
Real time conferencing Information Theft In a group, find a good example of case that presenting each of the risk above. Copying without authorized permission, exploiting, releasing potential damages onto sensitive material, data and information. Unauthorized Disclosure to disclose information to an individual who is not authorized to receive it Information Warfare is information operations conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries Accidental Data Loss the unforeseen loss of data or information. Activities Data Disclosure The exposure of information to individuals who normally would not have access to it Data Modification unauthorized modification activity to confidential data or information Data Availability reliable access to data and information services by unauthorized users. Hacking The unauthorized use of, or attempts to circumvent or bypass the security measures used by, a computer system or computer network. Cracking Activity of breaking (or cracking) the security of computer systems in order to access, steal, or destroy sensitive information. Spoofing Creating a fraudulent Web site to mimic an actual, well-known site run by another party.
Other example: Email spoofing, IP spoofing, DNS spoofing. Sniffing Monitoring over network traffic, usually to look for unencrypted information of value, such as passwords or confidential data. Reflection: Risks of Online services. Security threats by categories Security threats by activities By
Mohammad Nor Ihsan Md Zin
Mukah Polytechnic of Sarawak, Malaysia