Chapter6-3_�� - Learning Objectives Learning...

Info iconThis preview shows pages 1–17. Sign up to view the full content.

View Full Document Right Arrow Icon
Learning Objectives
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Learning Objectives
Background image of page 2
Information Systems Security Information systems security ) ± ²v 1 r ª ) Primary Threats to Information Systems Security
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Unauthorized Access Unauthorized people P ± P Brute force o ²N L e ‰“ ²N L þ P q ½ ª* ¸ 8 L þ o ² Wait time e e o CA³TCHA
Background image of page 4
Information Modification » p ) ª » ª* &
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Denial of Service Attack Viruse e worm ± Zombie computers r L p Web site ² e ³ À
Background image of page 6
Computer Viruses Virus: o gZ A ı a ± ) þ * ²N l þ ³ P ‰ ) ¸ Worm: o gZ A ı å þ ) þ * gZ * A åñþ ) `F * e . ²N ø * q½ª ) ¸ e&&
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Spyware g ) áõå þ * Í * 8 l ± ) o I ) Ú E @ E Freeware e shareware, web site ² P e ‚Z * A ³ A ± ) l ˝c þ * l þ l Z ª ) A ı ³ þ m f þ
Background image of page 8
Spam ¸ ±N l ² »p¼ * Spim o Spam FaLse positives o 8 l ² ) 8 ¸ l ³ q ª : FirewaLL o Ex) Barracuba Spam FirewaLL
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Spam Phishing ¤ » ± l ² ³ A l ² * ´ ºp¼ * ¸ / , L p * ‚g ª A õå þ* «þ
Background image of page 10
Cookies l ± @ ½ ¼ ª* ¸ / ² l ± ² e site ‚ Z * ² á å ñþ ² þ* ² Ú E A øþ ² ½p¼ * ¸ ² @¸ø ± ² , X ¼ * ¸ ± ½p¼ * ¸ , X ² ± * Ú A¸ø ± ½p ª* ¸ .
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Other Threats to IS Security 1. N l * ±±± , p ª ¨ e ½ª* 2. l ) ± ² Z e 3. ¨ R ª ¸ l þ * ± ² ½ 4. ‚g / ª * ³ õå þ ) —f ´ )±± r 5. ± ¸ø *
Background image of page 12
Information Systems Today: Managing in the Digital World 6-13 Learning Objectives
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Systems Today: Managing in the Digital World 6-14 Safeguarding Information Systems Resources Information systems audits o Risk analysis Process of assessing the value of protected assets o Cost of loss vs. cost of protection Risk reduction o Measures taken to protect the system Risk acceptance o Measures taken to absorb the damages Risk transfer o Transferring the absorption of risk to a third party
Background image of page 14
Information Systems Today: Managing in the Digital World 6-15 Technological Safeguards Physical access restrictions o Authentication Use of passwords Photo ID cards, smart cards Keys to unlock a computer Combination Authentication limited to o Something you have o Something you know o Something you are
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6-16 Biometrics Form of authentication o Fingerprints o Retinal patterns o Body weight o Etc. Fast
Background image of page 16
Image of page 17
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 49

Chapter6-3_�� - Learning Objectives Learning...

This preview shows document pages 1 - 17. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online