SlideShare a Scribd company logo
Threats to the System
Threats to the SystemIt is the system administrator’s responsibility to ensure that a system operates smoothly and efficiently.
An administrator must regularly monitor systems and correct any problems that may arise, and also maintain these systems to ensure that each user can access the most up-to-date software on a daily basis.
The main areas that a system administrator is responsible for are users, hardware, software, server operating systems and network administration.Threats to the SystemUsers
Threats to the SystemThe user is the most important aspect of a system administrator’s daily work.
The administrator is dedicated to looking after one or more systems.
Each system will have a number of users who access it daily.
For the most part, their day-to-day use of the system will run smoothly.
There will be instances, however, where the system administrator’s help may be required.Threats to the SystemDepending on the size of the organisation, the system administrator might not communicate with users directly.
A help desk may have been established to field telephone queries and attempt to solve them before they reach the system administrator.
This allows the system administrator to shift their focus from customer service to maintenance and monitoring.Threats to the SystemThe users of a system are not always people with little or no technical knowledge - some require access to certain areas of the system.Threats to the SystemHardware
Threats to the SystemThere is a wide range of computer hardware that a system administrator may be asked to look after.
Most organisations will have different types of PC workstations and servers, but it is not unusually to find an organisation that has a policy of buying servers and workstations from a single manufacturer.Threats to the SystemIf a system requires an upgrade, or a new system is to be purchased, the system administrator will need to work with the hardware reseller to determine the correct hardware configuration for the job.Threats to the SystemWhat is System Security
Threats to the SystemMost organizations store their business data on computer systems.
Much of this data is both confidential and valuable.
System security ensures that the data is not damaged, modified or disclosed to unauthorized people.Threats to the SystemData can be inadvertently damaged, modified or disclosed through:Physical damage to the computer system, such as that caused by fire or flood
Damage to the data itself, such as system malfunction or virus infection
Unauthorised users breaking into the system
Legitimate users operating beyond their authorised boundaries within the systemThreats to the SystemDifferent operating systems offer different facilities for securing the system.
At the higher security levels, many operating systems are able to support advanced features such as data encryption.
A more basic level of security may simply require user authentication using a username and password.Threats to the SystemThe level of security implemented on any system is largely going to depend on the sensitivity and importance of data stored on that system.Threats to the SystemTo offer a basic level of operating system security, these facilities are required:User level authentication (usernames and passwords)
Files system access control (file permissions)
Files system usage control (disk quotas)
Device access control
Network access controlThreats to the SystemEstablishing Organisational Security Requirements
Threats to the SystemTo determine the basic security requires of an organisation, the following issues need to be considered:What needs to be protected?
How can the organisation educate users on good security practise?
Does the organisation have an effective system backup and storage plan?
Is system security regularly monitored and maintained?Threats to the SystemWhat needs to be protected?
Threats to the SystemIt will be necessary to work closely with the management and staff to determine the data on the system that can be considered irreplaceable, or could result in a significant loss of income or business if lost. Threats to the SystemExamples of important data could include:Accounts information
Program code
Customer information
Operations information (job-tracking database)Threats to the SystemA level of importance, based on this information should be recommended to management.
Any resources that might be required during implementation (such as tape drives, security consultants) should also be outlined.Threats to the SystemUser Education

More Related Content

What's hot

A Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long IslandA Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long Island
kimreview
 
Operating system security
Operating system securityOperating system security
Operating system security
Ramesh Ogania
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
paramalways
 
Ch3
Ch3Ch3
Ch3
Ch3Ch3
L5 Dependability Requirements
L5 Dependability RequirementsL5 Dependability Requirements
L5 Dependability Requirements
Ian Sommerville
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
Gary Bahadur
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
sommerville-videos
 
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian RechbergerAndrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Information Security Awareness Group
 
Security curator presentation_eng
Security curator presentation_engSecurity curator presentation_eng
Security curator presentation_eng
atompark2
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
Tom Eston
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
Mohammed Alabdali
 
IT-Audit C&A
IT-Audit C&AIT-Audit C&A
IT-Audit C&A
Mang Sum
 
Mis presentation by suraj vaidya
Mis presentation by suraj vaidyaMis presentation by suraj vaidya
Mis presentation by suraj vaidya
Suraj Vaidya
 
Critical Systems
Critical SystemsCritical Systems
Critical Systems
Usman Bin Saad
 
Control System Cyber Security - A Different Approach
Control System Cyber Security - A Different ApproachControl System Cyber Security - A Different Approach
Control System Cyber Security - A Different Approach
Jim Cahill
 
Chap05
Chap05Chap05
Chap05
sumit621
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
Faheem Ul Hasan
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
Louie Medinaceli
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013
Ian Sommerville
 

What's hot (20)

A Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long IslandA Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long Island
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Ch3
Ch3Ch3
Ch3
 
Ch3
Ch3Ch3
Ch3
 
L5 Dependability Requirements
L5 Dependability RequirementsL5 Dependability Requirements
L5 Dependability Requirements
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian RechbergerAndrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
 
Security curator presentation_eng
Security curator presentation_engSecurity curator presentation_eng
Security curator presentation_eng
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
 
IT-Audit C&A
IT-Audit C&AIT-Audit C&A
IT-Audit C&A
 
Mis presentation by suraj vaidya
Mis presentation by suraj vaidyaMis presentation by suraj vaidya
Mis presentation by suraj vaidya
 
Critical Systems
Critical SystemsCritical Systems
Critical Systems
 
Control System Cyber Security - A Different Approach
Control System Cyber Security - A Different ApproachControl System Cyber Security - A Different Approach
Control System Cyber Security - A Different Approach
 
Chap05
Chap05Chap05
Chap05
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013
 

Viewers also liked

Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
Steven Cahill
 
Website Performance
Website PerformanceWebsite Performance
Website Performance
Steven Cahill
 
system Security
system Security system Security
system Security
Gaurav Mishra
 
Website Pre SEO Analysis Report- Online Marketing: Search Engine Optimization
Website Pre SEO Analysis Report- Online Marketing: Search Engine OptimizationWebsite Pre SEO Analysis Report- Online Marketing: Search Engine Optimization
Website Pre SEO Analysis Report- Online Marketing: Search Engine Optimization
Vikesh Sanwalodia
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
Reddhi Basu
 
SEO sample report
SEO sample report SEO sample report
SEO sample report
SEO Service Corporation
 
Program Threats
Program ThreatsProgram Threats
Program Threats
guestab0ee0
 
National parks of india
National parks of indiaNational parks of india
National parks of india
Gaurav Mishra
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
jayussuryawan
 
Website Structure Analysis Report Sample - SEO Traffic
Website Structure Analysis Report Sample - SEO TrafficWebsite Structure Analysis Report Sample - SEO Traffic
Website Structure Analysis Report Sample - SEO Traffic
SEO Traffic
 
Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23
DefconRussia
 
Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11
BarrBoy
 
Markup Documents
Markup DocumentsMarkup Documents
Markup Documents
Steven Cahill
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
Steven Cahill
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
Steven Cahill
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
Steven Cahill
 
The Art Of Typography
The Art Of TypographyThe Art Of Typography
The Art Of Typography
Steven Cahill
 
Web performance optimization (WPO)
Web performance optimization (WPO)Web performance optimization (WPO)
Web performance optimization (WPO)
Mariusz Kaczmarek
 
Purchasing Equipment
Purchasing EquipmentPurchasing Equipment
Purchasing Equipment
Steven Cahill
 
Browsers
BrowsersBrowsers
Browsers
Steven Cahill
 

Viewers also liked (20)

Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Website Performance
Website PerformanceWebsite Performance
Website Performance
 
system Security
system Security system Security
system Security
 
Website Pre SEO Analysis Report- Online Marketing: Search Engine Optimization
Website Pre SEO Analysis Report- Online Marketing: Search Engine OptimizationWebsite Pre SEO Analysis Report- Online Marketing: Search Engine Optimization
Website Pre SEO Analysis Report- Online Marketing: Search Engine Optimization
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
SEO sample report
SEO sample report SEO sample report
SEO sample report
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
National parks of india
National parks of indiaNational parks of india
National parks of india
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Website Structure Analysis Report Sample - SEO Traffic
Website Structure Analysis Report Sample - SEO TrafficWebsite Structure Analysis Report Sample - SEO Traffic
Website Structure Analysis Report Sample - SEO Traffic
 
Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23
 
Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11
 
Markup Documents
Markup DocumentsMarkup Documents
Markup Documents
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
The Art Of Typography
The Art Of TypographyThe Art Of Typography
The Art Of Typography
 
Web performance optimization (WPO)
Web performance optimization (WPO)Web performance optimization (WPO)
Web performance optimization (WPO)
 
Purchasing Equipment
Purchasing EquipmentPurchasing Equipment
Purchasing Equipment
 
Browsers
BrowsersBrowsers
Browsers
 

Similar to Threats To The System

Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
gitagrimston
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
anandanand521251
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
qacaybagirovv
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
ghayour abbas
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
Alisha Henderson
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
ChristopherAntonius
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
Anil Bilgihan
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
Sunipa Bera
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.com
PrescottLunt384
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
QA or the Highway
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
QA or the Highway
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
MEN Micro
 
Bis Chapter15
Bis Chapter15Bis Chapter15
Bis Chapter15
Chun Hoi Lam
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
Muhammad Asim
 
ossecurity-161dfghjkjn201150103 (1).pptx
ossecurity-161dfghjkjn201150103 (1).pptxossecurity-161dfghjkjn201150103 (1).pptx
ossecurity-161dfghjkjn201150103 (1).pptx
bestmorfingamer
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
Ramesh Upadhaya
 
I0516064
I0516064I0516064
I0516064
IOSR Journals
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
SecPod Technologies
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
Atef Yassin
 

Similar to Threats To The System (20)

Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.com
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
Bis Chapter15
Bis Chapter15Bis Chapter15
Bis Chapter15
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
ossecurity-161dfghjkjn201150103 (1).pptx
ossecurity-161dfghjkjn201150103 (1).pptxossecurity-161dfghjkjn201150103 (1).pptx
ossecurity-161dfghjkjn201150103 (1).pptx
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
I0516064
I0516064I0516064
I0516064
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
 

More from Steven Cahill

Google
GoogleGoogle
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
Steven Cahill
 
Quality Management
Quality ManagementQuality Management
Quality Management
Steven Cahill
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
Steven Cahill
 
Determining Client And Networking Requirements
Determining Client And Networking RequirementsDetermining Client And Networking Requirements
Determining Client And Networking Requirements
Steven Cahill
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network Design
Steven Cahill
 
Planning Your Website
Planning Your WebsitePlanning Your Website
Planning Your Website
Steven Cahill
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
Steven Cahill
 
Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
Steven Cahill
 
Testing Frameworks And Methodologies
Testing Frameworks And MethodologiesTesting Frameworks And Methodologies
Testing Frameworks And Methodologies
Steven Cahill
 
Web Standards And Protocols
Web Standards And ProtocolsWeb Standards And Protocols
Web Standards And Protocols
Steven Cahill
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
Steven Cahill
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security Requirements
Steven Cahill
 

More from Steven Cahill (13)

Google
GoogleGoogle
Google
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Quality Management
Quality ManagementQuality Management
Quality Management
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Determining Client And Networking Requirements
Determining Client And Networking RequirementsDetermining Client And Networking Requirements
Determining Client And Networking Requirements
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network Design
 
Planning Your Website
Planning Your WebsitePlanning Your Website
Planning Your Website
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 
Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
 
Testing Frameworks And Methodologies
Testing Frameworks And MethodologiesTesting Frameworks And Methodologies
Testing Frameworks And Methodologies
 
Web Standards And Protocols
Web Standards And ProtocolsWeb Standards And Protocols
Web Standards And Protocols
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security Requirements
 

Recently uploaded

Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Erasmo Purificato
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
BookNet Canada
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 

Recently uploaded (20)

Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 

Threats To The System

  • 2. Threats to the SystemIt is the system administrator’s responsibility to ensure that a system operates smoothly and efficiently.
  • 3. An administrator must regularly monitor systems and correct any problems that may arise, and also maintain these systems to ensure that each user can access the most up-to-date software on a daily basis.
  • 4. The main areas that a system administrator is responsible for are users, hardware, software, server operating systems and network administration.Threats to the SystemUsers
  • 5. Threats to the SystemThe user is the most important aspect of a system administrator’s daily work.
  • 6. The administrator is dedicated to looking after one or more systems.
  • 7. Each system will have a number of users who access it daily.
  • 8. For the most part, their day-to-day use of the system will run smoothly.
  • 9. There will be instances, however, where the system administrator’s help may be required.Threats to the SystemDepending on the size of the organisation, the system administrator might not communicate with users directly.
  • 10. A help desk may have been established to field telephone queries and attempt to solve them before they reach the system administrator.
  • 11. This allows the system administrator to shift their focus from customer service to maintenance and monitoring.Threats to the SystemThe users of a system are not always people with little or no technical knowledge - some require access to certain areas of the system.Threats to the SystemHardware
  • 12. Threats to the SystemThere is a wide range of computer hardware that a system administrator may be asked to look after.
  • 13. Most organisations will have different types of PC workstations and servers, but it is not unusually to find an organisation that has a policy of buying servers and workstations from a single manufacturer.Threats to the SystemIf a system requires an upgrade, or a new system is to be purchased, the system administrator will need to work with the hardware reseller to determine the correct hardware configuration for the job.Threats to the SystemWhat is System Security
  • 14. Threats to the SystemMost organizations store their business data on computer systems.
  • 15. Much of this data is both confidential and valuable.
  • 16. System security ensures that the data is not damaged, modified or disclosed to unauthorized people.Threats to the SystemData can be inadvertently damaged, modified or disclosed through:Physical damage to the computer system, such as that caused by fire or flood
  • 17. Damage to the data itself, such as system malfunction or virus infection
  • 18. Unauthorised users breaking into the system
  • 19. Legitimate users operating beyond their authorised boundaries within the systemThreats to the SystemDifferent operating systems offer different facilities for securing the system.
  • 20. At the higher security levels, many operating systems are able to support advanced features such as data encryption.
  • 21. A more basic level of security may simply require user authentication using a username and password.Threats to the SystemThe level of security implemented on any system is largely going to depend on the sensitivity and importance of data stored on that system.Threats to the SystemTo offer a basic level of operating system security, these facilities are required:User level authentication (usernames and passwords)
  • 22. Files system access control (file permissions)
  • 23. Files system usage control (disk quotas)
  • 25. Network access controlThreats to the SystemEstablishing Organisational Security Requirements
  • 26. Threats to the SystemTo determine the basic security requires of an organisation, the following issues need to be considered:What needs to be protected?
  • 27. How can the organisation educate users on good security practise?
  • 28. Does the organisation have an effective system backup and storage plan?
  • 29. Is system security regularly monitored and maintained?Threats to the SystemWhat needs to be protected?
  • 30. Threats to the SystemIt will be necessary to work closely with the management and staff to determine the data on the system that can be considered irreplaceable, or could result in a significant loss of income or business if lost. Threats to the SystemExamples of important data could include:Accounts information
  • 33. Operations information (job-tracking database)Threats to the SystemA level of importance, based on this information should be recommended to management.
  • 34. Any resources that might be required during implementation (such as tape drives, security consultants) should also be outlined.Threats to the SystemUser Education
  • 35. Threats to the SystemEven the most rigid security system can be laid to waste if users keep their passwords written on post-it notes attached to their workstation monitors.
  • 36. This kind of security flaw is common in many organisations and should be considered the first order of business when designing computer security policies.Threats to the SystemTo keep track of security and user education, organise a contact for users who think a security breach has occurred.
  • 37. While most reports are false alarms, it is still important to ensure the user is satisfied that security is a going concern.
  • 38. Keeping a record of these reports will also enable a system administrator to determine just how effective security and user education is within an organisation.Threats to the SystemDelivery of this education can be done in a number of different ways:Regular workshops
  • 41. One-on-one tutorialsThreats to the SystemIntranet websites have become popular as a means of user education in medium to large organisations.
  • 42. They are cheap and easy to set up, and the software infrastructure already exists within most of the modern server operating systems.Threats to the SystemSystem Backups
  • 43. Threats to the SystemFull system backups need to be regularly performed and then stored off site.
  • 44. In the event of a major disaster (fire, flood, earthquake), the system can be reconstructed with new hardware.
  • 45. When choosing an offsite location, ensure that physical security is adequate.
  • 46. It may be easier to steal the system backup tapes from that location than to attempt to access the system directly.Threats to the SystemMonitoring Security
  • 47. Threats to the SystemTo maintain system security, it is necessary to monitor it closely to ensure that the right people are accessing the right resources.
  • 48. The integrity of the operating system must also be maintained.
  • 49. This can be a difficult process if the system administrator is not an expert in computer security.Threats to the SystemThere are two ways in which the system administrator can monitor security:Keeping up to date with all the operating system updates and being aware of what services those updates affect.Subscribing to a security advisory organisation such as AusCERT (www.auscert.org.au), an organisation dedicated to informing system administrators of vulnerable points in the security of their systems
  • 50. Threats to the SystemUser Productive and Security
  • 51. Threats to the SystemHeaving security can impose a burden on users.
  • 52. People are becoming accustomed to accessing computer systems with ease.
  • 53. If you must impose heavy restrictions, be prepared to explain why.
  • 54. The best approach is to try to create a culture of security awareness, where users know the risks of unsafe practices.Threats to the SystemIn responding positively, they will police the system themselves because they appreciate its value to them.