laudon_ch07 - 7.1 7 Chapter Securing Information Securing...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 7.1 7 Chapter Securing Information Securing Information Systems Systems 7.2 STUDENT LEARNING OBJECTIVES Essentials of Business Information Systems Essentials of Business Information Systems Chapter 7 Securing Information Systems Chapter 7 Securing Information Systems Why are information systems vulnerable to destruction, error, and abuse? What is the business value of security and control? What are the components of an organizational framework for security and control? Evaluate the most important tools and technologies for safeguarding information resources. 7.3 Online Games Need Security, Too Problem: Threat of attacks from hackers hoping to steal information or gaming assets. Solutions: Deploy an advanced security system to identify threats and reduce hacking attempts. Essentials of Business Information Systems Essentials of Business Information Systems Chapter 7 Securing Information Systems Chapter 7 Securing Information Systems 7.4 Online Games Need Security, Too NetContinuums NC-2000 AG firewall and Cenzics ClickToSecure service work in tandem to minimize the chance of a security breach. Demonstrates ITs role in combating cyber crime. Illustrates digital technologys role in achieving security on the Web. Essentials of Business Information Systems Essentials of Business Information Systems Chapter 7 Securing Information Systems Chapter 7 Securing Information Systems 7.5 Online Games Need Security, Too Essentials of Business Information Systems Essentials of Business Information Systems Chapter 7 Securing Information Systems Chapter 7 Securing Information Systems 7.6 System Vulnerability and Abuse An unprotected computer connected to Internet may be disabled within seconds Security: Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems Controls: Methods, policies, and organizational procedures that ensure safety of organizations assets; accuracy and reliability of its accounting records; and operational adherence to management standards Essentials of Business Information Systems Essentials of Business Information Systems Chapter 7 Securing Information Systems Chapter 7 Securing Information Systems 7.7 Why Systems Are Vulnerable Why Systems Are Vulnerable Hardware problems Breakdowns, configuration errors, damage from improper use or crime Software problems Programming errors, installation errors, unauthorized changes) Disasters Power failures, flood, fires, etc. Use of networks and computers outside of firms control E.g. with domestic or offshore outsourcing vendors System Vulnerability and Abuse Essentials of Business Information Systems Essentials of Business Information Systems Chapter 7 Securing Information Systems Chapter 7 Securing Information Systems 7.8 Contemporary Security Challenges and Vulnerabilities Contemporary Security Challenges and Vulnerabilities...
View Full Document

This note was uploaded on 09/08/2011 for the course ISYS 363 taught by Professor Bmak during the Spring '08 term at S.F. State.

Page1 / 51

laudon_ch07 - 7.1 7 Chapter Securing Information Securing...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online