SlideShare a Scribd company logo
Threats to the System
Threats to the SystemIt is the system administrator’s responsibility to ensure that a system operates smoothly and efficiently.
An administrator must regularly monitor systems and correct any problems that may arise, and also maintain these systems to ensure that each user can access the most up-to-date software on a daily basis.
The main areas that a system administrator is responsible for are users, hardware, software, server operating systems and network administration.Threats to the SystemUsers
Threats to the SystemThe user is the most important aspect of a system administrator’s daily work.
The administrator is dedicated to looking after one or more systems.
Each system will have a number of users who access it daily.
For the most part, their day-to-day use of the system will run smoothly.
There will be instances, however, where the system administrator’s help may be required.Threats to the SystemDepending on the size of the organisation, the system administrator might not communicate with users directly.
A help desk may have been established to field telephone queries and attempt to solve them before they reach the system administrator.
This allows the system administrator to shift their focus from customer service to maintenance and monitoring.Threats to the SystemThe users of a system are not always people with little or no technical knowledge - some require access to certain areas of the system.Threats to the SystemHardware
Threats to the SystemThere is a wide range of computer hardware that a system administrator may be asked to look after.
Most organisations will have different types of PC workstations and servers, but it is not unusually to find an organisation that has a policy of buying servers and workstations from a single manufacturer.Threats to the SystemIf a system requires an upgrade, or a new system is to be purchased, the system administrator will need to work with the hardware reseller to determine the correct hardware configuration for the job.Threats to the SystemWhat is System Security
Threats to the SystemMost organizations store their business data on computer systems.
Much of this data is both confidential and valuable.
System security ensures that the data is not damaged, modified or disclosed to unauthorized people.Threats to the SystemData can be inadvertently damaged, modified or disclosed through:Physical damage to the computer system, such as that caused by fire or flood
Damage to the data itself, such as system malfunction or virus infection
Unauthorised users breaking into the system
Legitimate users operating beyond their authorised boundaries within the systemThreats to the SystemDifferent operating systems offer different facilities for securing the system.
At the higher security levels, many operating systems are able to support advanced features such as data encryption.
A more basic level of security may simply require user authentication using a username and password.Threats to the SystemThe level of security implemented on any system is largely going to depend on the sensitivity and importance of data stored on that system.Threats to the SystemTo offer a basic level of operating system security, these facilities are required:User level authentication (usernames and passwords)
Files system access control (file permissions)
Files system usage control (disk quotas)
Device access control
Network access controlThreats to the SystemEstablishing Organisational Security Requirements
Threats to the SystemTo determine the basic security requires of an organisation, the following issues need to be considered:What needs to be protected?
How can the organisation educate users on good security practise?
Does the organisation have an effective system backup and storage plan?
Is system security regularly monitored and maintained?Threats to the SystemWhat needs to be protected?
Threats to the SystemIt will be necessary to work closely with the management and staff to determine the data on the system that can be considered irreplaceable, or could result in a significant loss of income or business if lost. Threats to the SystemExamples of important data could include:Accounts information
Program code
Customer information
Operations information (job-tracking database)Threats to the SystemA level of importance, based on this information should be recommended to management.
Any resources that might be required during implementation (such as tape drives, security consultants) should also be outlined.Threats to the SystemUser Education

More Related Content

PDF
5 Things to Know about Safety and Security of Embedded Systems
MEN Mikro Elektronik GmbH
 
PPTX
System dependability
sommerville-videos
 
PPTX
Ch02 mis-ctrl-appl
SR NAIDU
 
PPTX
Ch14-Software Engineering 9
Ian Sommerville
 
PPTX
Ch10-Software Engineering 9
Ian Sommerville
 
PPT
Security & ethical challenges
Louie Medinaceli
 
PPTX
Ch12 safety engineering
software-engineering-book
 
PPTX
Security and Control Issues in Information System
Daryl Conson
 
5 Things to Know about Safety and Security of Embedded Systems
MEN Mikro Elektronik GmbH
 
System dependability
sommerville-videos
 
Ch02 mis-ctrl-appl
SR NAIDU
 
Ch14-Software Engineering 9
Ian Sommerville
 
Ch10-Software Engineering 9
Ian Sommerville
 
Security & ethical challenges
Louie Medinaceli
 
Ch12 safety engineering
software-engineering-book
 
Security and Control Issues in Information System
Daryl Conson
 

What's hot (20)

PPTX
A Quick Look At The Computer Support Long Island
kimreview
 
PPTX
Operating system security
Ramesh Ogania
 
PPT
Security And Ethical Challenges Of Infornation Technology
paramalways
 
PPT
Ch3
Saad Gabr
 
PPT
Ch3
phanleson
 
PPTX
L5 Dependability Requirements
Ian Sommerville
 
PPT
Physical Security Assessment
Gary Bahadur
 
PPTX
Introduction to real time software systems script
sommerville-videos
 
PDF
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Information Security Awareness Group
 
PPTX
Security curator presentation_eng
atompark2
 
PPT
Physical Security Assessments
Tom Eston
 
PPTX
Policy and procedure of hospitals
Mohammed Alabdali
 
DOCX
IT-Audit C&A
Mang Sum
 
PDF
Mis presentation by suraj vaidya
Suraj Vaidya
 
PPT
Critical Systems
Usman Bin Saad
 
PPT
Control System Cyber Security - A Different Approach
Jim Cahill
 
PPT
Chap05
sumit621
 
PPTX
Physical Security Assessment
Faheem Ul Hasan
 
PPT
Security & ethical challenges
Louie Medinaceli
 
PPTX
CS5032 L10 security engineering 2 2013
Ian Sommerville
 
A Quick Look At The Computer Support Long Island
kimreview
 
Operating system security
Ramesh Ogania
 
Security And Ethical Challenges Of Infornation Technology
paramalways
 
L5 Dependability Requirements
Ian Sommerville
 
Physical Security Assessment
Gary Bahadur
 
Introduction to real time software systems script
sommerville-videos
 
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Information Security Awareness Group
 
Security curator presentation_eng
atompark2
 
Physical Security Assessments
Tom Eston
 
Policy and procedure of hospitals
Mohammed Alabdali
 
IT-Audit C&A
Mang Sum
 
Mis presentation by suraj vaidya
Suraj Vaidya
 
Critical Systems
Usman Bin Saad
 
Control System Cyber Security - A Different Approach
Jim Cahill
 
Chap05
sumit621
 
Physical Security Assessment
Faheem Ul Hasan
 
Security & ethical challenges
Louie Medinaceli
 
CS5032 L10 security engineering 2 2013
Ian Sommerville
 
Ad

Viewers also liked (20)

PPTX
Writing For The Web
Steven Cahill
 
PPTX
Website Performance
Steven Cahill
 
PPTX
system Security
Gaurav Mishra
 
DOC
Website Pre SEO Analysis Report- Online Marketing: Search Engine Optimization
Vikesh Sanwalodia
 
PPTX
Program and System Threats
Reddhi Basu
 
PDF
SEO sample report
SEO Service Corporation
 
PPTX
Program Threats
guestab0ee0
 
PPTX
National parks of india
Gaurav Mishra
 
PPTX
Chapter 3 security part i auditing operating systems and networks
jayussuryawan
 
PDF
Website Structure Analysis Report Sample - SEO Traffic
SEO Traffic
 
PDF
Advanced cfg bypass on adobe flash player 18 defcon russia 23
DefconRussia
 
PPT
Understanding operating systems 5th ed ch11
BarrBoy
 
PPTX
Markup Documents
Steven Cahill
 
PPTX
Writing For The Web
Steven Cahill
 
PPTX
Disaster Recovery
Steven Cahill
 
PPTX
Writing For The Web
Steven Cahill
 
PPTX
The Art Of Typography
Steven Cahill
 
PPTX
Web performance optimization (WPO)
Mariusz Kaczmarek
 
PPTX
Purchasing Equipment
Steven Cahill
 
PPTX
Browsers
Steven Cahill
 
Writing For The Web
Steven Cahill
 
Website Performance
Steven Cahill
 
system Security
Gaurav Mishra
 
Website Pre SEO Analysis Report- Online Marketing: Search Engine Optimization
Vikesh Sanwalodia
 
Program and System Threats
Reddhi Basu
 
SEO sample report
SEO Service Corporation
 
Program Threats
guestab0ee0
 
National parks of india
Gaurav Mishra
 
Chapter 3 security part i auditing operating systems and networks
jayussuryawan
 
Website Structure Analysis Report Sample - SEO Traffic
SEO Traffic
 
Advanced cfg bypass on adobe flash player 18 defcon russia 23
DefconRussia
 
Understanding operating systems 5th ed ch11
BarrBoy
 
Markup Documents
Steven Cahill
 
Writing For The Web
Steven Cahill
 
Disaster Recovery
Steven Cahill
 
Writing For The Web
Steven Cahill
 
The Art Of Typography
Steven Cahill
 
Web performance optimization (WPO)
Mariusz Kaczmarek
 
Purchasing Equipment
Steven Cahill
 
Browsers
Steven Cahill
 
Ad

Similar to Threats To The System (20)

DOCX
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
gitagrimston
 
PPT
Information Security Audit and Analysis Module
AvinashAvuthu2
 
PDF
I0516064
IOSR Journals
 
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
SolomonSB
 
PDF
Ijcatr04061002
Editor IJCATR
 
PDF
Computer Threat.pdf
ZaraFatima29
 
PPTX
Information security FundameFundamentals.pptx
atuexaminations
 
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
gayosacissey70
 
DOC
Computer Security Policy
everestsky66
 
PPTX
InformationSecurity
learnt
 
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
molicochoual
 
PPT
Software Security Engineering
Muhammad Asim
 
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
camitatse
 
PPT
Security - Chapter 1.ppt
WorknehEdimealem
 
PPTX
Management Information Systems ( Security and Control.pptx
NamugenyiBetty
 
PPT
3e - Security Of Data
MISY
 
PDF
Security on z/OS
IBM India Smarter Computing
 
PPT
Managing System Security
PIREH
 
PDF
Cyber security
Shreya Acharya
 
PDF
20210629_104540Information Security L1.pdf
Shyma Jugesh
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
gitagrimston
 
Information Security Audit and Analysis Module
AvinashAvuthu2
 
I0516064
IOSR Journals
 
Computer Securityyyyyyyy - Chapter 1.ppt
SolomonSB
 
Ijcatr04061002
Editor IJCATR
 
Computer Threat.pdf
ZaraFatima29
 
Information security FundameFundamentals.pptx
atuexaminations
 
Accounting Information Systems 11th Edition Bodnar Solutions Manual
gayosacissey70
 
Computer Security Policy
everestsky66
 
InformationSecurity
learnt
 
Accounting Information Systems 11th Edition Bodnar Solutions Manual
molicochoual
 
Software Security Engineering
Muhammad Asim
 
Accounting Information Systems 11th Edition Bodnar Solutions Manual
camitatse
 
Security - Chapter 1.ppt
WorknehEdimealem
 
Management Information Systems ( Security and Control.pptx
NamugenyiBetty
 
3e - Security Of Data
MISY
 
Security on z/OS
IBM India Smarter Computing
 
Managing System Security
PIREH
 
Cyber security
Shreya Acharya
 
20210629_104540Information Security L1.pdf
Shyma Jugesh
 

More from Steven Cahill (13)

PPTX
Google
Steven Cahill
 
PPTX
Networking Standards And Protocols
Steven Cahill
 
PPTX
Quality Management
Steven Cahill
 
PPTX
Network Hardware And Software
Steven Cahill
 
PPTX
Determining Client And Networking Requirements
Steven Cahill
 
PPTX
Introduction To Network Design
Steven Cahill
 
PPTX
Planning Your Website
Steven Cahill
 
PPTX
Introduction To Networking
Steven Cahill
 
PPTX
Confirm Client Requirements
Steven Cahill
 
PPTX
Testing Frameworks And Methodologies
Steven Cahill
 
PPTX
Web Standards And Protocols
Steven Cahill
 
PPTX
Web Server Web Site Security
Steven Cahill
 
PPTX
Basic Security Requirements
Steven Cahill
 
Networking Standards And Protocols
Steven Cahill
 
Quality Management
Steven Cahill
 
Network Hardware And Software
Steven Cahill
 
Determining Client And Networking Requirements
Steven Cahill
 
Introduction To Network Design
Steven Cahill
 
Planning Your Website
Steven Cahill
 
Introduction To Networking
Steven Cahill
 
Confirm Client Requirements
Steven Cahill
 
Testing Frameworks And Methodologies
Steven Cahill
 
Web Standards And Protocols
Steven Cahill
 
Web Server Web Site Security
Steven Cahill
 
Basic Security Requirements
Steven Cahill
 

Recently uploaded (20)

PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Software Development Company | KodekX
KodekX
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Software Development Company | KodekX
KodekX
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 

Threats To The System

  • 2. Threats to the SystemIt is the system administrator’s responsibility to ensure that a system operates smoothly and efficiently.
  • 3. An administrator must regularly monitor systems and correct any problems that may arise, and also maintain these systems to ensure that each user can access the most up-to-date software on a daily basis.
  • 4. The main areas that a system administrator is responsible for are users, hardware, software, server operating systems and network administration.Threats to the SystemUsers
  • 5. Threats to the SystemThe user is the most important aspect of a system administrator’s daily work.
  • 6. The administrator is dedicated to looking after one or more systems.
  • 7. Each system will have a number of users who access it daily.
  • 8. For the most part, their day-to-day use of the system will run smoothly.
  • 9. There will be instances, however, where the system administrator’s help may be required.Threats to the SystemDepending on the size of the organisation, the system administrator might not communicate with users directly.
  • 10. A help desk may have been established to field telephone queries and attempt to solve them before they reach the system administrator.
  • 11. This allows the system administrator to shift their focus from customer service to maintenance and monitoring.Threats to the SystemThe users of a system are not always people with little or no technical knowledge - some require access to certain areas of the system.Threats to the SystemHardware
  • 12. Threats to the SystemThere is a wide range of computer hardware that a system administrator may be asked to look after.
  • 13. Most organisations will have different types of PC workstations and servers, but it is not unusually to find an organisation that has a policy of buying servers and workstations from a single manufacturer.Threats to the SystemIf a system requires an upgrade, or a new system is to be purchased, the system administrator will need to work with the hardware reseller to determine the correct hardware configuration for the job.Threats to the SystemWhat is System Security
  • 14. Threats to the SystemMost organizations store their business data on computer systems.
  • 15. Much of this data is both confidential and valuable.
  • 16. System security ensures that the data is not damaged, modified or disclosed to unauthorized people.Threats to the SystemData can be inadvertently damaged, modified or disclosed through:Physical damage to the computer system, such as that caused by fire or flood
  • 17. Damage to the data itself, such as system malfunction or virus infection
  • 18. Unauthorised users breaking into the system
  • 19. Legitimate users operating beyond their authorised boundaries within the systemThreats to the SystemDifferent operating systems offer different facilities for securing the system.
  • 20. At the higher security levels, many operating systems are able to support advanced features such as data encryption.
  • 21. A more basic level of security may simply require user authentication using a username and password.Threats to the SystemThe level of security implemented on any system is largely going to depend on the sensitivity and importance of data stored on that system.Threats to the SystemTo offer a basic level of operating system security, these facilities are required:User level authentication (usernames and passwords)
  • 22. Files system access control (file permissions)
  • 23. Files system usage control (disk quotas)
  • 25. Network access controlThreats to the SystemEstablishing Organisational Security Requirements
  • 26. Threats to the SystemTo determine the basic security requires of an organisation, the following issues need to be considered:What needs to be protected?
  • 27. How can the organisation educate users on good security practise?
  • 28. Does the organisation have an effective system backup and storage plan?
  • 29. Is system security regularly monitored and maintained?Threats to the SystemWhat needs to be protected?
  • 30. Threats to the SystemIt will be necessary to work closely with the management and staff to determine the data on the system that can be considered irreplaceable, or could result in a significant loss of income or business if lost. Threats to the SystemExamples of important data could include:Accounts information
  • 33. Operations information (job-tracking database)Threats to the SystemA level of importance, based on this information should be recommended to management.
  • 34. Any resources that might be required during implementation (such as tape drives, security consultants) should also be outlined.Threats to the SystemUser Education
  • 35. Threats to the SystemEven the most rigid security system can be laid to waste if users keep their passwords written on post-it notes attached to their workstation monitors.
  • 36. This kind of security flaw is common in many organisations and should be considered the first order of business when designing computer security policies.Threats to the SystemTo keep track of security and user education, organise a contact for users who think a security breach has occurred.
  • 37. While most reports are false alarms, it is still important to ensure the user is satisfied that security is a going concern.
  • 38. Keeping a record of these reports will also enable a system administrator to determine just how effective security and user education is within an organisation.Threats to the SystemDelivery of this education can be done in a number of different ways:Regular workshops
  • 41. One-on-one tutorialsThreats to the SystemIntranet websites have become popular as a means of user education in medium to large organisations.
  • 42. They are cheap and easy to set up, and the software infrastructure already exists within most of the modern server operating systems.Threats to the SystemSystem Backups
  • 43. Threats to the SystemFull system backups need to be regularly performed and then stored off site.
  • 44. In the event of a major disaster (fire, flood, earthquake), the system can be reconstructed with new hardware.
  • 45. When choosing an offsite location, ensure that physical security is adequate.
  • 46. It may be easier to steal the system backup tapes from that location than to attempt to access the system directly.Threats to the SystemMonitoring Security
  • 47. Threats to the SystemTo maintain system security, it is necessary to monitor it closely to ensure that the right people are accessing the right resources.
  • 48. The integrity of the operating system must also be maintained.
  • 49. This can be a difficult process if the system administrator is not an expert in computer security.Threats to the SystemThere are two ways in which the system administrator can monitor security:Keeping up to date with all the operating system updates and being aware of what services those updates affect.Subscribing to a security advisory organisation such as AusCERT (www.auscert.org.au), an organisation dedicated to informing system administrators of vulnerable points in the security of their systems
  • 50. Threats to the SystemUser Productive and Security
  • 51. Threats to the SystemHeaving security can impose a burden on users.
  • 52. People are becoming accustomed to accessing computer systems with ease.
  • 53. If you must impose heavy restrictions, be prepared to explain why.
  • 54. The best approach is to try to create a culture of security awareness, where users know the risks of unsafe practices.Threats to the SystemIn responding positively, they will police the system themselves because they appreciate its value to them.