Chapter 11 - Chapter11: ComputerCrimeand...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 11: Computer Crime and  Information Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Succeeding with Technology, Third Edition 2 Objectives Describe the types of information that must be kept  secure and the types of threats against them Describe five methods of keeping a PC safe and  secure Discuss the threats and defenses unique to  multiuser networks Discuss the threats and defenses unique to  wireless networks Describe the threats posed by hackers, viruses,  spyware, frauds, and scams, and the methods of  defending against them
Background image of page 2
Succeeding with Technology, Third Edition 3 Chapter Content Information Security and Vulnerability Machine-Level Security Network Security Wireless Network Security Internet Security
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Succeeding with Technology, Third Edition 4 Information Security Corporate and government networks are  under attack, and the Internet is the  battlefield Many types of attacks can be made on  computer systems Viruses Identity theft Theft of personal information Unauthorized use of your computer Information security involves Confidentiality, integrity, availability
Background image of page 4
Succeeding with Technology, Third Edition 5 Information Security
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Succeeding with Technology, Third Edition 6 Information Security
Background image of page 6
Succeeding with Technology, Third Edition 7 Information security Total information security Securing all components of the global digital  information infrastructure Cell phones PCs Government and business networks Internet routers Communications satellites
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Succeeding with Technology, Third Edition 8 Information Security and  Vulnerability Identity theft   The criminal act of using stolen information  about a person to assume that person’s identity Intellectual property  Product of the mind or intellect over which the  owner holds legal entitlement Intellectual property rights   Ownership and use of intellectual property such  as software, music, movies, data, and  information
Background image of page 8
Succeeding with Technology, Third Edition Information Security and  Vulnerability Organizational information Compromised information can lead to Loss of market share Business failure Business intelligence Process of gathering information in the pursuit of  business advantage Competitive intelligence Concerned with information about competitors Counterintelligence   Concerned with protecting your own information from  access by your competitors 9
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Security and  Vulnerability Businesses are targets of most attacks Virus Insider abuse of Internet access Laptop theft Unauthorized access by insiders Denial-of-service attacks System penetration Theft of property information
Background image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 75

Chapter 11 - Chapter11: ComputerCrimeand...

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online