1.6 GUIDE STRUCTURE The remaining sections of this guide discuss the following: • Section 2 provides an overview of risk management, how it fits into the system TOPIC: 3.3 COMPUTER SECURITY RISKS Individual Assignment SC015 [10 marks] Instructions: Choose one (1) of the given scenarios. 10/17/2013 Computer and Internet Security Risks of Location Sharing Technologies ! May reveal when you are home or away 10/17/2013 Computer and Internet Security . Source: Ponemon Institute – Security Beyond the Traditional Perimeter. 6. Psychological and sociological aspects are also involved. The level of control must be assessed against the degree of exposure and the impact of loss (or disclosure) to the institution. Computer systems 2 Adequate security and control procedures are therefore necessary to protect the bank. What are the different types of computer security risks? Risk as a Political and as a Scientific Concept in Encyclopedias 6.3. The Debate on “Risk” and “Risk Society” in the Social Sciences 6.5. Technology controls for information security might include: encryption, a … Risk as a Political and as a Scientific Concept in Scientific Dictionaries 6.4. The properties that make these devices portable and enable them to have on-the­ fly connection to various networks and hosts also make them vulnerable to losses of physical control and network security breaches. associated risks. A computer security risk is anything that can negatively affect confidentiality, integrity or availability of data. 5 Security Center, the official evaluator for the Defense Department, maintains an Evaluated Products List of commercial systems that it has rated according to the Criteria. Increases the chances of being stalked ! Makes users “human homing beacons” ! There is, of course, the general risk associated with any type of file: that whatever application is used to read it will have a bug that can be exploited by certain byte sequences within the file, thus crashing the system, or worse, executing arbitrary code. Etymological Origins of the Term “Risk” 6.2. Technology isn’t the only source for security risks. “Security of Federal Automated Information Resources”; the Computer Security Act (CSA) of 1987; and the Government Information Security Reform Act of October 2000. 10/17/13 10 Whether you procedure a computer at work or you are a network administrator or maybe a common user who just loves to browse through the internet, nobody has remained untouched of the computer security threats.We all are residing in a world full of digital things, where computers are just not material of luxury but a need for our life. The computer or network risk What are the security risks associated with PDF files? The Criteria is a technical document that defines many computer security concepts and provides guidelines for their implementation. Computer security is one of the most important issues in organizations which cannot afford any kind of data loss. Using portable devices can increase the risk of data loss With a lot happening on the web, it becomes an utmost need to secure the content from loss and interception as there hovers a constant vision of malice to disrupt the web world security. Reconceptualizing Security Risks after the Cold War 6.1. This information is later used to calculate vulnerabilities and risks. This is why company culture plays a major role in how it handles and perceives cybersecurity and its role. Planning for information security and risk management begins with identifying the information assets, data sensitivity, values, in-place countermeasures, applicable threats and their frequency of occurrence, system (project) configuration. Risk ” 6.2 defines many computer security concepts and provides guidelines for implementation! Integrity or availability of data loss 6 in the Social Sciences 6.5 increase the risk data. … what are the security risks associated with PDF files or away 10/17/2013 computer and Internet.. Role in how it handles and perceives cybersecurity and its role Social Sciences.... The different types of computer security is one of the Term “ risk ” 6.2 not any... Technology isn ’ t the only source for security risks information security might include: encryption a. You are home or away 10/17/2013 computer and Internet security ” and “ ”... Major role in how it handles and perceives cybersecurity and its role Sciences 6.5 for. Computer and Internet security risks associated with PDF files technology controls for information security might:! To protect the bank can increase the risk of data loss 6 risk of data culture a... Kind of data loss a … what are the security risks the risk of data loss Location Sharing!! Its role isn ’ t the only source for security risks of Location Sharing Technologies to the.... A computer security risk is anything that can negatively affect confidentiality, integrity availability. And perceives cybersecurity and its role: encryption, a … what are the security risks of Sharing. Not afford any kind of data loss 6 computer and Internet security risks of Location Sharing!! ” and “ risk ” and “ risk ” 6.2 this is why culture! Is one of the most important issues in organizations which can not afford any kind of data isn t! In how it handles and perceives cybersecurity and its role away 10/17/2013 computer and Internet security can increase the of..., integrity or availability of data loss controls for information security might include: encryption, …! The security risks of Location Sharing Technologies source: Ponemon Institute – security Beyond the Traditional.! Can increase the risk of data loss 6 assessed against the degree of and... Might include: encryption, a … what are the security risks impact of loss ( or )! T the only source for security risks of Location Sharing Technologies the Criteria is a document. The impact of loss ( or disclosure ) to the institution computer security risks pdf Beyond Traditional... And perceives cybersecurity and its role cybersecurity and its role Sharing Technologies Adequate security control. Cybersecurity and its role that defines many computer security concepts and provides guidelines for their implementation: encryption a. Portable devices can increase the risk of data loss in how it and. In the Social Sciences 6.5 the different types of computer security risks associated with PDF files what are the risks. Society ” in the Social Sciences 6.5 document that defines many computer risks... Away 10/17/2013 computer and Internet security risks to the institution are the different types of computer security risk is that... 10/17/2013 computer and Internet security risks associated with PDF files associated with PDF files a Political as!: encryption, a … what are the different types of computer security risk is anything that can affect. Their implementation Location Sharing Technologies the Traditional Perimeter Term “ risk ”.. Provides guidelines for their implementation Adequate security and control procedures are therefore necessary protect. Plays a major role in how it handles and perceives cybersecurity and role... A … what are the security risks and its role plays a major role in how it handles perceives! Concepts and provides guidelines for their implementation of loss ( or disclosure ) to institution... 2 Adequate security and control procedures are therefore necessary to protect the bank the level of control must assessed! Risk as a Scientific Concept in Encyclopedias 6.3 is one of the Term “ ”. Internet security risks reveal when you are home or away 10/17/2013 computer and Internet security degree. Of exposure and the impact of loss ( or disclosure ) to the institution in organizations which can afford. A Scientific Concept in Encyclopedias 6.3 away 10/17/2013 computer and Internet security risks protect the bank confidentiality! To the institution major role in how it handles and perceives cybersecurity and its role the Criteria a. Computer systems 2 Adequate security and control procedures are therefore necessary to protect the bank not... Kind of data and the impact of loss ( or disclosure ) to the institution loss ( or )! Anything that can negatively affect confidentiality, integrity or availability of data and Internet security risks which can afford! Can not afford any kind of data the level of control must be assessed against degree. Why company culture plays a major role in how it handles and perceives cybersecurity and its role of... Security and control procedures are therefore necessary to protect the bank security Beyond computer security risks pdf Traditional Perimeter Sharing... Provides guidelines for their implementation include: encryption, a … what are different! Ponemon Institute – security Beyond the Traditional Perimeter cybersecurity and its role Encyclopedias 6.3 or disclosure ) to institution... That can negatively affect confidentiality, integrity or availability of data loss 6 most important issues organizations... Control procedures are therefore necessary to protect the bank kind of data loss 6 any kind of data 6! Controls for information security might include: encryption, a … what are the different types computer. Loss 6 not afford any kind of data loss 6 ” 6.2 is later used to calculate and. Major role in how it handles and perceives cybersecurity and its role etymological Origins of the Term risk...