Session 21 - Securing IT Systems Bin Gu, Ph.D. Assistant...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Securing IT Systems Bin Gu, Ph.D. Assistant Professor of IM [email protected] Ph: 512-471-1582; Fax: 512-471-0587
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Next Class Read Chapter 11 BB readings Datamining Walmart – What they know about your Submit Significant Assignment 3
Background image of page 2
LEARNING OBJECTIVES Analyze why information systems need special protection from destruction, error, and abuse. Assess the business value of security and control. Design an organizational framework for security and control. Evaluate the most important tools and technologies for safeguarding information resources.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Problem: Large number of vulnerable users of online financial services, ease of creating bogus Web sites. Solutions: Deploy anti-phishing software and services and a multilevel authentication system to identify threats and reduce phishing attempts. Deploying new tools, technologies, and security procedures, along with educating consumers, increases reliability and customer confidence. Demonstrates IT’s role in combating cyber crime. Illustrates digital technology as part of a multilevel solution as well as its limitations in overcoming discouraged consumers. Phishing: A Costly New Sport for Internet Users
Background image of page 4
Security Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems Controls Methods, policies, and organizational procedures that ensure: Safety of organization’s assets Accuracy and reliability of accounting records Operational adherence to management standards Systems Vulnerability and Abuse
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Why systems are vulnerable Electronic data vulnerable to more types of threats than manual data Networks Potential for unauthorized access, abuse, or fraud is not limited to single location but can occur at any access point in network Vulnerabilities exist at each layer and between layers E.g. user error, viruses, hackers, radiation, hardware or software failure, theft Systems Vulnerability and Abuse
Background image of page 6
Contemporary Security Challenges and Vulnerabilities Contemporary Security Challenges and Vulnerabilities The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network. Systems Vulnerability and Abuse
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Internet vulnerabilities Public network, so open to anyone Size of Internet means abuses may have widespread impact Fixed IP addresses are fixed target for hackers VoIP phone service vulnerable to interception E-mail, instant messaging vulnerable to malicious software, interception Systems Vulnerability and Abuse
Background image of page 8
Wireless security challenges Many home networks and public hotspots open to anyone, so not secure, communication unencrypted
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/26/2009 for the course MIS 301 taught by Professor Mccleod during the Spring '08 term at University of Texas.

Page1 / 46

Session 21 - Securing IT Systems Bin Gu, Ph.D. Assistant...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online