This preview shows page 1. Sign up to view the full content.
Unformatted text preview: list and describe the three major components of a security program 3. Please search, find, and detail three examples of organizations (not individuals) who have faced IS security problems. Please make sure to tell how these organizations dealt with the breaches. Please include your sources of information. The five components of an information system include hardware, software, data, people and procedure. They relate to safeguards by Technical protection: hardware and software, Data protection: data, Human protection: people and procedure. The technical safeguard helps with Identification and authentication, Encryption, Digital signature, Firewall, Malware protection and Design secure application. The Data safeguard will Specifying user rights and responsibilities, Store sensitive data in encrypted form and do a Regular backup and practice recovery. The human safegua...
View Full Document
- Spring '08