F09_class_40_IS_Security

F09_class_40_IS_Secu - Information Security Management Chapter 12 Click to edit Master subtitle style Gray and Patton MIS 301 Introduction to IT

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Click to edit Master subtitle style Information Security Management Chapter 12 Gray and Patton MIS 301 Introduction to IT Management
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Click to edit Master subtitle style Study Questions What are sources and types of security threats? What are elements of a security program? How can technical safeguards protect against security threats? How you safeguard data against security threats? How can human safeguards protect against threats? What is necessary for disaster preparedness? How should organizations respond to security incidents?
Background image of page 2
Click to edit Master subtitle style CIA Triad Confidentiality - preventing disclosure of information to unauthorized individuals or systems Availability - the information must be available when it is needed Integrity - data cannot be modified without authorization
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Click to edit Master subtitle style Security Threats
Background image of page 4
Click to edit Master subtitle style Human Error and Mistakes Internal employees Misunderstand operating procedures and accidentally delete customer records Poorly written application programs and poorly designed procedures External personnel Customers Business partners
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Click to edit Master subtitle style Malicious Human Activities Use Social Engineering http://en.wikipedia.org/wiki/Social_engineering_(security) Internal employees Who intentionally destroy data or other systems components.
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/17/2010 for the course MIS 301 taught by Professor Mccleod during the Spring '08 term at University of Texas at Austin.

Page1 / 24

F09_class_40_IS_Secu - Information Security Management Chapter 12 Click to edit Master subtitle style Gray and Patton MIS 301 Introduction to IT

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online