Security - Chapter11 Security Objective...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 11 Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What security threats to information  systems exist How to protect from computer risks Objective
Background image of page 2
Attackers Cracker a person who uses illicit actions to obtain and use passwords to breech system security. Hacker a computer programmer obtaining unauthorized access to systems through skills. Script Kiddie a computer intruders with little or no skill who simply follows directions without fully understanding the meaning of the steps they are performing. Intruder hackers, crackers, and others performing illicit intrusion or damage to computer systems or data.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Important Terms Cyber Security involves protecting computer systems, networks, and information by preventing, detecting, and responding to attacks. Cyber Terrorism the use of target computers, networks, and data to cause physical, real-world harm or severe disruption. Information Warfare the use of information technology to obtain a competitive advantage over a competitor. Corporate Espionage the practice of obtaining information about a business organization that is considered secret or confidential without the permission of the holder of the information.
Background image of page 4
Corporate Concerns Denial of Service overloads a network with packets slowing and crippling the legitimate network traffic Unsecured E-Mail allows passwords to be stored in cookies On-line Fraud Risk risks in online transactions Bandwidth Consumption Business responsibility Consumption of other resources Falling sales
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Corporate Concerns Cont’d Information Acquisition Does the business have a good reason for requesting the information that it wishes to  gather?  Is it acquiring it in a safe manner so that it cannot be overheard or seen by others?                    Storage      What computer security measures are placed around the systems storing personal  data?      Is data access restricted and not open to common access within the organization? Data Access     Is personal identifying information available only to those employees with a need to  know? Database 
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/06/2011 for the course IT 103 taught by Professor Sangjara during the Fall '08 term at George Mason.

Page1 / 30

Security - Chapter11 Security Objective...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online