Security - Chapter 11 Secur ity • What secur ity threats...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Chapter 11 Secur ity • What secur ity threats t o infor mation systems exist • How to prot ect from comput er r isks Objective Attacker s Cracker a person who uses illicit actions to obtain and use passwords to breech system security. Hacker a computer programmer obtaining unauthorized access to systems through skills. Script Kiddie a computer intruders with little or no skill who simply follows directions without fully understanding the meaning of the steps they are performing. Intruder hackers, crackers, and others performing illicit intrusion or damage to computer systems or data. I mpor tant Ter ms Cyber Security — involves protecting computer systems, networks, and information by preventing, detecting, and responding to attacks. Cyber Terrorism — the use of target computers, networks, and data to cause physical, real-world harm or severe disruption. Information Warfare — the use of information technology to obtain a competitive advantage over a competitor. Corporate Espionage — the practice of obtaining information about a business organization that is considered secret or confidential without the permission of the holder of the information. Cor por ate Concer ns Denial of Service overloads a network with packets slowing and crippling the legitimate network traffic Unsecured E-Mail allows passwords to be stored in cookies On-line Fraud Risk risks in online transactions Bandwidth Consumption Business responsibility Consumption of other resources Falling sales Cor por ate Concer ns Cont’d I nfor mation Acquisition • Does the business have a good reason for requesting the information that it wishes to gather? • I s it acquiring it in a safe manner so that it cannot be overheard or seen by others? Stor age • What computer security measures are placed around the systems storing personal data? • I s data access restricted and not open to common access within the organization?...
View Full Document

{[ snackBarMessage ]}

Page1 / 30

Security - Chapter 11 Secur ity • What secur ity threats...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online