Chapter 8.docx - Chapter 8 Securing Information Systems Student Learning Objectives 8-1 Why are information systems vulnerable to destruction error and

Chapter 8.docx - Chapter 8 Securing Information Systems...

This preview shows page 1 - 2 out of 2 pages.

Chapter 8 Securing Information Systems Student Learning Objectives 8-1 Why are information systems vulnerable to destruction, error, and abuse? 8-2 What is the business value of security and control? 8-3 What are the components of an organizational framework for security and control? 8-4 What are the most important tools and technologies for safeguarding information resources? diagnostics. Students can use any modern, web-enabled device (smartphone, tablet, or laptop) to access it. For more information on using Learning Catalytics in your course, contact your Pearson Representative. Key Terms The following alphabetical list identifies the key terms discussed in this chapter. Acceptable use policy (AUP) Information systems audit Antivirus software Intrusion detection systems Application controls Key loggers Authentication Malware Biometric authentication Managed security service providers (MSSPs) Botnet Online transaction processing
Image of page 1
Image of page 2

You've reached the end of your free preview.

Want to read both pages?

  • Summer '20
  • Public key infrastructure, Spyware

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes