MIS_446_info_security

MIS_446_info_security - Information Security MIS 446 Click...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Click to edit Master subtitle style 4/8/10 Information Security MIS 446
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4/8/10 All Security Involves Tradeoffs Security, when it works, creates no output Best-case scenario: nothing unusual happens Usability vs. risk Intangibles cannot be standardized People have different perceptions and value systems
Background image of page 2
4/8/10 U.S. Deaths per Year (alphabetical order) Airplane accidents Cancer Dog attacks Lightning Motor vehicle accidents Murder Residential fires
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4/8/10 U.S. Deaths per Year (rounded) Cancer 550,000 Motor vehicle accidents 42,000 Murder 16,000 Residential fires 3,500 Airplane accidents 600 Lightning 90 Dog attacks 20
Background image of page 4
4/8/10 Technology Amplifies Risk 26 million names on paper ~ 5 tons Office Space (“salami slicing”) Viruses Slammer (2003) scanned 55 million computers – per second; 1 computer on typical LAN capable of 30,000 machines/ sec Script kiddies
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4/8/10 Botnets China Power grid Kneber/Zeus SpyEye
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 15

MIS_446_info_security - Information Security MIS 446 Click...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online