Chapter6-3_�� - Learning Objectives Learning...

Info iconThis preview shows pages 1–17. Sign up to view the full content.

View Full Document Right Arrow Icon
Learning Objectives
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Learning Objectives
Background image of page 2
Information Systems Security Information systems security ) ± ²v 1 r ª ) Primary Threats to Information Systems Security
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Unauthorized Access Unauthorized people P ± P Brute force o ²N L e ‰“ ²N L þ P q ½ ª* ¸ 8 L þ o ² Wait time e e o CA³TCHA
Background image of page 4
Information Modification » p ) ª » ª* &
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Denial of Service Attack Viruse e worm ± Zombie computers r L p Web site ² e ³ À
Background image of page 6
Computer Viruses Virus: o gZ A ı a ± ) þ * ²N l þ ³ P ‰ ) ¸ Worm: o gZ A ı å þ ) þ * gZ * A åñþ ) `F * e . ²N ø * q½ª ) ¸ e&&
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Spyware g ) áõå þ * Í * 8 l ± ) o I ) Ú E @ E Freeware e shareware, web site ² P e ‚Z * A ³ A ± ) l ˝c þ * l þ l Z ª ) A ı ³ þ m f þ
Background image of page 8
Spam ¸ ±N l ² »p¼ * Spim o Spam FaLse positives o 8 l ² ) 8 ¸ l ³ q ª : FirewaLL o Ex) Barracuba Spam FirewaLL
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Spam Phishing ¤ » ± l ² ³ A l ² * ´ ºp¼ * ¸ / , L p * ‚g ª A õå þ* «þ
Background image of page 10
Cookies l ± @ ½ ¼ ª* ¸ / ² l ± ² e site ‚ Z * ² á å ñþ ² þ* ² Ú E A øþ ² ½p¼ * ¸ ² @¸ø ± ² , X ¼ * ¸ ± ½p¼ * ¸ , X ² ± * Ú A¸ø ± ½p ª* ¸ .
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Other Threats to IS Security 1. N l * ±±± , p ª ¨ e ½ª* 2. l ) ± ² Z e 3. ¨ R ª ¸ l þ * ± ² ½ 4. ‚g / ª * ³ õå þ ) —f ´ )±± r 5. ± ¸ø *
Background image of page 12
Information Systems Today: Managing in the Digital World 6-13 Learning Objectives
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Information Systems Today: Managing in the Digital World 6-14 Safeguarding Information Systems Resources Information systems audits o Risk analysis Process of assessing the value of protected assets o Cost of loss vs. cost of protection Risk reduction o Measures taken to protect the system Risk acceptance o Measures taken to absorb the damages Risk transfer o Transferring the absorption of risk to a third party
Background image of page 14
Information Systems Today: Managing in the Digital World 6-15 Technological Safeguards Physical access restrictions o Authentication Use of passwords Photo ID cards, smart cards Keys to unlock a computer Combination Authentication limited to o Something you have o Something you know o Something you are
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
6-16 Biometrics Form of authentication o Fingerprints o Retinal patterns o Body weight o Etc. Fast
Background image of page 16
Image of page 17
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 49

Chapter6-3_�� - Learning Objectives Learning...

This preview shows document pages 1 - 17. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online