IST3e Ch06 - Chapter 6 Securing Information Systems 66...

Info iconThis preview shows pages 1–14. Sign up to view the full content.

View Full Document Right Arrow Icon
Information Systems Today: Managing in the Digital World 6-1 6 Chapter Securing Information Systems “66 percent of all Webroot-scanned personal computers are infected with at least 25 spyware programs.” Webroot (2005)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Systems Today: Managing in the Digital World 6-2 Learning Objectives
Background image of page 2
Information Systems Today: Managing in the Digital World 6-3 Learning Objectives
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Systems Today: Managing in the Digital World 6-4 Information Systems Security All systems connected to a network are at risk o Internal threats o External threats Information systems security o Precautions to keep IS safe from unauthorized access and use Increased need for good computer security with increased use of the Internet
Background image of page 4
Information Systems Today: Managing in the Digital World 6-5 Primary Threats to Information Systems Security Accidents and natural disasters o Power outages, cats walking across keyboards Employees and consultants Links to outside business contacts o Travel between business affiliates Outsiders Viruses
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Systems Today: Managing in the Digital World 6-6 Unauthorized Access Unauthorized people o Look through electronic data o Peek at monitors o Intercept electronic communication Theft of computers or storage media Determined hackers gain administrator status
Background image of page 6
Information Systems Today: Managing in the Digital World 6-7 Gaining Access to a Password Brute force o Try combinations until a match is found Protection: o Wait time requirements after unsuccessful login attempt o CAPTCHA
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Systems Today: Managing in the Digital World 6-8 Information Modification User accesses electronic information User changes information o Employee gives himself a raise
Background image of page 8
Information Systems Today: Managing in the Digital World 6-9 Denial of Service Attack Attackers prevent legitimate users from accessing services Zombie computers o Created by viruses or worms o Attack Web sites
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Systems Today: Managing in the Digital World 6-10 Computer Viruses Corrupt and destroy data Destructive code can o Erase a hard drive o Seize control of a computer Worms o Variation of a virus o Replicate endlessly across the Internet o Servers crash MyDoom attack on Microsoft’s Web site
Background image of page 10
Information Systems Today: Managing in the Digital World 6-11 Spyware Within freeware or shareware Within a Web site Gathers information about a user o Credit card information o Behavior tracking for marketing purposes Eats up computer’s memory and network bandwidth Adware – special kind of spyware o Collects information for banner ad customization
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Systems Today: Managing in the Digital World 6-12 Spam Electronic junk mail Advertisements of products and services Eats up storage space Compromises network bandwidth Spim o Spam over IM
Background image of page 12
Information Systems Today: Managing in the Digital World 6-13 Protection Against Spam Barracuda Spam Firewall 600
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 14
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/09/2009 for the course EST 325 taught by Professor Wan during the Spring '09 term at SUNY Stony Brook.

Page1 / 54

IST3e Ch06 - Chapter 6 Securing Information Systems 66...

This preview shows document pages 1 - 14. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online