ch # 6 securing information systems “66 percent of all webroot-scanned personal computers are...
TRANSCRIPT
![Page 1: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/1.jpg)
CH # 6Securing Information Systems
“66 percent of all Webroot-scanned personal computers are infected with at
least 25 spyware programs.”Webroot (2005)
![Page 2: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/2.jpg)
Topics to be discussed
1. The meaning of “Information System Security” term.2. Primary Threats to Information Systems Security.3. How IS(s) are often compromised?4. Technological and human- based safeguards.5. Q:How to Better manage IS Security?6. The State of System Security Management Today.
(self study p. 256)
Intro. to ISs © 2008,I. Sarah Al-Bakry 2
![Page 3: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/3.jpg)
“Information System Security “ term
• All systems connected to a network are at risk– Internal threats– External threats
• Information systems security definition:– Precautions to keep all aspects of IS safe from
unauthorized access and use(all HW, SW, Network, equipment and Data)
• Increased need for good computer security with increased use of the Internet
Intro. to ISs © 2008,I. Sarah Al-Bakry 3
![Page 4: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/4.jpg)
Primary Threats to Information Systems Security
1. Accidents and natural disasters
Power outages, cats walking across keyboards
2. Employees and consultants
3. Links to outside business contacts
Travel between business partners
4. Outsiders (Hackers, Crackers, Viruses)
1
2
3
4
Intro. to ISs © 2008,I. Sarah Al-Bakry 4
![Page 5: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/5.jpg)
HW
Check the difference between:Hackers, Crackers, Viruses
From the glossary
![Page 6: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/6.jpg)
IS(s) are often compromised by one or more of the following:
Intro. to ISs © 2008,I. Sarah Al-Bakry 6
![Page 7: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/7.jpg)
Unauthorized Access
• Unauthorized people– Look through electronic
data– Peek (steal a look) at
monitors– Intercept (cut off)
electronic communication
• Unauthorized access may be achieved:
- Theft of computers or storage media.
- Get an administrator status.
Intro. to ISs © 2008,I. Sarah Al-Bakry 7
![Page 8: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/8.jpg)
Gaining Access to a Password
• Brute force– Try combinations until
a match is found• Protection:
– Wait time requirements after unsuccessful login attempt.
– CAPTCHACompletely Automated Public
Tuning Test to tell computers and Humans Apart
Intro. to ISs © 2008,I. Sarah Al-Bakry 8
![Page 9: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/9.jpg)
Information Modification• User accesses
electronic information
• User changes information– Employee gives
himself a raise.– Crackers hack
government computers and change info.
Intro. to ISs © 2008,I. Sarah Al-Bakry 9
![Page 10: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/10.jpg)
Denial of Service Attack• Attackers prevent
legitimate users from accessing services
• Zombie computers– Created by viruses or
worms– Attack Web sites.– Look for the definition of
“Zombie computer” in the glossary.
Intro. to ISs © 2008,I. Sarah Al-Bakry 10
![Page 11: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/11.jpg)
Computer Viruses
• Corrupt and destroy data• Destructive code can
– Erase a hard drive– Seize(get hold of) control of
a computer• Worms
– Variation of a virus– Replicate endlessly across
the Internet– Servers crash
• My Doom attack on Microsoft’s Web site
Intro. to ISs © 2008,I. Sarah Al-Bakry 11
![Page 12: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/12.jpg)
HW
Check the difference between:Viruses , Worms, Trojan Hours
From the glossary
![Page 13: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/13.jpg)
Spyware
• Within freeware or shareware• Within a Web site• Gathers information about a user
– Credit card information– Behavior tracking for marketing purposes
• Eats up computer’s memory and network bandwidth• Adware – special kind of spyware
– Collects information for banner ad customization
Intro. to ISs © 2008,I. Sarah Al-Bakry 13
![Page 14: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/14.jpg)
Spam
• Electronic junk mail• Advertisements of
products and services• Eats up storage space• Compromises network
bandwidth• Spim
– Spam over IM
Intro. to ISs © 2008,I. Sarah Al-Bakry 14
![Page 15: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/15.jpg)
Protection Against Spam
• Barracuda Spam Firewall 600– Filters spam and other email threats– Decreases amount of spam processed by the central e-
mail server– Handles 3,000 – 10,000 active email users– Spam messages blocked or quarantines
Intro. to ISs © 2008,I. Sarah Al-Bakry 15
![Page 16: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/16.jpg)
Phishing
• Attempts to trick users into giving away credit card numbers
• Phony messages• Duplicates of legitimate
Web sites• E.g., eBay, PayPal have
been used
Intro. to ISs © 2008,I. Sarah Al-Bakry 16
![Page 17: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/17.jpg)
Cookies
• Messages passed to a Web browser from a Web server
• Used for Web site customization• Cookies may contain sensitive information• Cookie management and cookie killer
software• Internet Explorer Web browser settings
Intro. to ISs © 2008,I. Sarah Al-Bakry 17
![Page 18: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/18.jpg)
Other Threats to IS Security
1. Employees writing passwords on paper
2. No installation of antivirus software
3. Use of default network passwords
4. Letting outsiders view monitors
Intro. to ISs © 2008,I. Sarah Al-Bakry 18
![Page 19: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/19.jpg)
Other Threats to IS Security (II)
5. Organizations fail to limit access to some files
6. Organizations fail to install firewalls
7. Not doing proper background checks
8. Lack of employee monitoring
9. Fired employees who are resentful
Intro. to ISs © 2008,I. Sarah Al-Bakry 19
![Page 20: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/20.jpg)
Technological safeguards
1. Physical access restrictions– Authentication
• Use of passwords• Photo ID cards, smart cards• Keys to unlock a computer• Combination
Authentication limited too Something you haveo Something you knowo Something you are
Intro. to ISs © 2008,I. Sarah Al-Bakry 20
![Page 21: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/21.jpg)
Biometricsالبيولوجية ((اإلحصائيات
• Form of authentication– Fingerprints– Retinal patterns
الشبكية ) ( أنماط– رقم 35 شريحة التفاصيل من لمزيد
– Body weight– Etc.
• Fast authentication• High security
Intro. to ISs © 2008,I. Sarah Al-Bakry 21
![Page 22: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/22.jpg)
Access-Control Software
• Access only to files required for work• Read-only access• Certain time periods for allowed access• Business systems applications
– Built-in access control capabilities
Intro. to ISs © 2008,I. Sarah Al-Bakry 22
![Page 23: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/23.jpg)
Wireless LAN Control
• Wireless LAN cheap and easy to install
• Use on the rise• Signal transmitted
through the air– at risk to being
intercepted– Drive-by hacking
Intro. to ISs © 2008,I. Sarah Al-Bakry 23
![Page 24: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/24.jpg)
Technological safeguards
2. Firewalls: System designed to detect intrusion and prevent unauthorized access.
• Implementation– Hardware, software, mixed
Intro. to ISs © 2008,I. Sarah Al-Bakry 24
![Page 25: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/25.jpg)
Technological safeguards3. Encryption• Message encoded before sending• Message decoded when received
– Public key technology• Each individual has a pair of keys
– Public key – freely distributed– Private key – kept secret
Intro. to ISs © 2008,I. Sarah Al-Bakry 25
![Page 26: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/26.jpg)
Encryption for Websites
• Certificate Authority – Third party – trusted middleman
• Verifies trustworthiness of a Web site• Checks for identity of a computer• Provides public keys
• Secure Sockets Layer (SSL)– Developed by Netscape
Intro. to ISs © 2008,I. Sarah Al-Bakry 26
![Page 27: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/27.jpg)
Technological safeguards
4. Recommended Virus Precautions
• Purchase and install antivirus software– Update frequently
• Do not download data from unknown sources– Flash drives, disks, Web sites
• Delete (without opening) e-mail from unknown source
• Warn people if you get a virus– Your department– People on e-mail list
Intro. to ISs © 2008,I. Sarah Al-Bakry 27
![Page 28: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/28.jpg)
Technological safeguards
5. Audit Control Software• Keeps track of computer activity• Spots suspicious action• Audit trail
– Record of users– Record of activities
• IT department needs to monitor this activity
Intro. to ISs © 2008,I. Sarah Al-Bakry 28
![Page 29: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/29.jpg)
Other Technological Safeguards
• Backups – Secondary storage devices– Regular intervals
• Closed-circuit television (CCTV)– Monitoring for physical intruders– Video cameras display and record all activity– Digital video recording
• Uninterruptible power supply (UPS)– Protection against power off.
Intro. to ISs © 2008,I. Sarah Al-Bakry 29
![Page 30: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/30.jpg)
Human Safeguards
• Use of federal and state laws as well as ethics
Intro. to ISs © 2008,I. Sarah Al-Bakry 30
![Page 31: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/31.jpg)
Q:How to Better manage IS Security?
Answer: By developing an Information Systems Security Plan
Ongoing five-step process1. Risk analysis.2.Policies and procedures.3. Implementation.4. Training – organization’s personnel.5. Auditing.
Intro. to ISs © 2008,I. Sarah Al-Bakry 31
![Page 32: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/32.jpg)
The State of System Security Management Today
Self Study p. 256
(The Points only)
Intro. to ISs © 2008,I. Sarah Al-Bakry 32
![Page 33: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/33.jpg)
THE END of the chapter
Intro. to ISs © 2008,I. Sarah Al-Bakry 33
![Page 34: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/34.jpg)
التالية الشرائحلإلطالع
Intro. to ISs © 2008,I. Sarah Al-Bakry 34
![Page 35: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/35.jpg)
Retinal Patternالخاليا • أنسجة من يتكون رقيق غشاء هي البشرية العين شبكية
. البنية بسبب العين من الحق جزء في تقع التي العصبيةكل ، بالدم الشبكية تزود التي الدموية للشعريات المعقدة
. نوعها من فريدة شبكية لديه شخص
بحيث • لدرجة معقدة العين شبكية في الدموية األوعية شبكة . متماثل نمط لها ليس ، المتماثلة التوائم حتى
بعض • بسبب G أحيانا العين شبكية أنماط تغير من الرغم علىتتغير ال بالعادة الشبكية أن اال السكري حاالت في مثل األمراض
. الموت حتى الوالدة منذ
وسائل • كإحدى تستخدم فإنها ، والثابتة الفريدة ولطبيعتها. البيولوجية الموثوقية
• Source: http://en.wikipedia.org/wiki/Retinal_scanIntro. to ISs © 2008,I. Sarah Al-Bakry 35
![Page 36: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/36.jpg)
Cookies• G صغيرا G ملفا زياراتها يتم عندما الويب، مواقع معظم تضع
) ) ، المتصفح الزائر بجهاز الخاص الصلب القرص على " عبارة " هي الكوكيز وملفات ، كوكي يسمى الملف هذا
شفرات أو برامج ليست أنها اذ نصية، ملفات عنالمعلومات بعض جمع إلى الكوكي هذا ويهدف برمجية
يتطلب الموقع كان إذا خاصة ،G أحيانا مفيد وهو عنك، . الحالة هذه ففي بزيارته تخولك مرور كلمة إدخال منكسيتمكن إذ الكلمة، تلك إلدخال زيارة كل في تضطر لن " الذي " ، الكوكي طريق عن بنفسه اكتشافها من الموقعاول من وذلك الجهاز في الصلب القرص على وضعه تم ) الكوكيز ( النصية الملفات هذه تحتوي أخر بمعنى زيارةيسترجعها أن أودعها الذي للموقع تتيح معلومات على
. للموقع المقبلة زيارتكم عند أي الحاجة، عند
Intro. to ISs © 2008,I. Sarah Al-Bakry 36
![Page 37: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/37.jpg)
Cookies
في • الكوكيز استغالل يتم ان الممكن من ولكنمعلومات وجمع المستخدمين خصوصية انتهاك
. ترغبون ال كنتم إذا للمواقع تصفحهم خالل عنهم " الصلب " القرص على كوكيز اآلخرون يسجل أن
المعلومات بعض جمع بهدف جهازكم، فينستخدمه الذي المتصفح تجهيز فبإالمكان عنكم،
أي يحفظ أن قبل الموافقة يطلب بحيث . " الصلب" القرص على ، كوكي
Intro. to ISs © 2008,I. Sarah Al-Bakry 37
![Page 38: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/38.jpg)
Mydoom (computer worm)From Wikipedia, the free encyclopedia
• Mydoom, also known as W32.MyDoom@mm, watson postmortem debugger, Novarg, Mimail.R and Shimgapi, is a computer virus affecting Microsoft Windows. It was first sighted on January 26, 2004. It became the fastest-spreading e-mail worm ever (as of January 2004[update]), exceeding previous records set by the Sobig worm.[1]
• Mydoom appears to have been commissioned by e-mail spammers so as to send junk e-mail through infected computers.[2] The worm contains the text message “andy; I'm just doing my job, nothing personal, sorry,” leading many to believe that the worm's creator was paid to do so. Early on, several security firms published their belief that the worm originated from a professional underground programmer in Russia.[3] The actual author of the worm is unknown.
Intro. to ISs © 2008,I. Sarah Al-Bakry 38
![Page 39: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/39.jpg)
Sobig (computer worm)From Wikipedia, the free encyclopedia
• The Sobig Worm was a computer worm that infected millions of Internet-connected, Microsoft Windows computers in August 2003.
• Although there were indications that tests of the worm were carried out as early as August 2002, Sobig.A was first found in the wild in January 2003. Sobig.B was released on May 2003. It was first called Palyh, but was later renamed to Sobig.B after anti-virus experts discovered it was a new generation of Sobig. Sobig.C was released May 31 and fixed the timing bug in Sobig.B. Sobig.D came a couple of weeks later followed by Sobig.E in June 25. On August 19, Sobig.F became known and set a record in sheer volume of e-mails.
• The worm was most widespread in its "Sobig.F" variant.• Sobig is a computer worm in the sense that it replicates by itself, but also a
Trojan horse in that it masquerades as something other than malware. The Sobig worm will appear as an electronic mail with one of the following subjects:
Intro. to ISs © 2008,I. Sarah Al-Bakry 39
![Page 40: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/40.jpg)
Sobig (computer worm)• Re: Approved • Re: Details • Re: Re: My details • Re: Thank you! • Re: That movie • Re: Wicked screensaver • Re: Your application • Thank you! • Your details
Intro. to ISs © 2008,I. Sarah Al-Bakry 40
![Page 41: CH # 6 Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)](https://reader036.vdocuments.site/reader036/viewer/2022081519/56649ec45503460f94bcf006/html5/thumbnails/41.jpg)
Sobig (computer worm)• It will contain the text: "See the attached file for details" or
"Please see the attached file for details." It also contains an attachment by one of the following names:
• application.pif • details.pif • document_9446.pif • document_all.pif • movie0045.pif • thank_you.pif • your_details.pif • your_document.pif • wicked_scr.scr
Intro. to ISs © 2008,I. Sarah Al-Bakry 41