Welcome!!

Hey y'all! Welcome to our blog! We're the students of BM2201B from UiTM KBM.

We've created this blog as part of our assignment for MGT417 - Information Technology in Business.



Denial: This blog is an educational blog that has been created to fulfill the purpose of our study. Nothing harmful things will be posted in this blog and all the entries are written by the students ans is for educational purposes only. We are not responsible for any harm that cause by the information that you readers has gained. Thank you.

-authors

Tuesday 12 April 2011

Threat to Information Systems.

Unintentional acts are those acts with no malicious intent. One of them is Human Errors and represented by far the most serious threats to information security.


Human Errors
There are different categories of organizational employees. First category is comprised of regular employees, who span the breadth and depth of the organization, from mail clerks to the CEO, and in all functional areas. The higher the level of employees, the greater the threat the employee poses to information security. This situations exist because higher-level employees has greater access on organizational information systems.
The second category includes contract labour, consultants, and janitor and guards. Contract labour such as temporary hires, may be overlooked in information security. However, these employees often have access to the company’s network, information systems, and information assets. Consultants, although technically not employees, do works for the company. They also may have access to the company’s network, information systems, and information assets.
Human errors or mistakes by employees pose a large problem as the result of laziness, carelessness, or a lack of awareness concerning information security. This lack of awareness usually comes from poor education and training efforts by the organization. Human mistakes manifest themselves in many different ways.

Human Mistakes

1.      Tailgating.

 
A technique designed to allow the perpetrator to enter restricted areas that are controlled with locks or card entry. The perpetrator follows closely behind a legitimate employee and, when the employee gains entry, asks them to ‘hold the door’.
To deter tailgating, many companies have anti-tailgating doors protecting the entrance into high-security areas.  Note that only one person at a time can go through this door.

1.      Shoulder surfing.



The perpetrator watches the employee’s computer screen over that person’s shoulder. This technique is particularly successful in public areas.

1.      Carelessness with laptops and portable devices.




Losing, misplacing, leaving them in taxis, and so on.
 
1.      Opening questionable e-mails.
Opening e-mails from someone unknown, or clicking on links embedded in e-mails.

1.      Careless internet surfing.
 

Accessing questionable websites, can result in malware and/or alien software being introduced into the organization’s network.
 
Posted for : Ms Ernie Aidilia
Posted by : Muhammad Haziq Bin Ghazali (2010592633)


 
.

No comments:

Post a Comment

Sila la mencarot.. ;P