Chapter 11

Chapter 11 - Succeeding with Technology, 4th ed >...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Succeeding with Technology, 4th ed > Computer Crime and Information Security > Succeeding with Technology, 4th ed > Computer Crime and Information Security > Please discontinue use of cell phone and turn off the ringer. n Information Security and Vulnerability n Machine-Level Security n Network Security n Wireless Network Security n Internet Security Computer Crime and Information Security Chapter 11 Succeeding with Technology, 4th ed > Computer Crime and Information Security > Succeeding with Technology > Computer Crime and Information Security > Succeeding with Technology, 4th ed > Computer Crime and Information Security > Information Security Overview 2008 Computer Security Institutes Computer Crime and Security survey n 49% of businesses experience computer virus infestations n 27% suffer targeted attacks from hackers n 12 % suffer from electronic financial fraud costing on average nearly $500,000 Succeeding with Technology, 4th ed > Computer Crime and Information Security > Succeeding with Technology > Computer Crime and Information Security > Succeeding with Technology, 4th ed > Computer Crime and Information Security > Total Information Security n Total Information Security involves securing all components of the global digital information infrastructure. Personal Computers Business Computer Systems Government Systems International Systems n Participation by EVERYONE is important and difficult to gain! See what the White House has to say on the subject at http://www.whitehouse.gov/pcipb/ Succeeding with Technology, 4th ed > Computer Crime and Information Security > Succeeding with Technology > Computer Crime and Information Security > Succeeding with Technology, 4th ed > Computer Crime and Information Security > Total Information Security n To achieve total information security, we must examine security in levels. n Risks increase with each expanding layer. Succeeding with Technology, 4th ed > Computer Crime and Information Security > n Key Terms Information Security Identity Theft Intellectual Property Intellectual Property Rights Cyberterrorism Information Security and Vulnerability Security Holes Software Patches Piracy Plagiarism Hacker Computer Forensics Succeeding with Technology, 4th ed > Computer Crime and Information Security > What is at Stake? Succeeding with Technology, 4th ed > Computer Crime and Information Security > Succeeding with Technology > Computer Crime and Information Security > Succeeding with Technology, 4th ed > Computer Crime and Information Security > At stake: Personal Private Information n What would concern you most if a person who wished to do you harm had full control of your PC?...
View Full Document

This note was uploaded on 11/08/2011 for the course CGS 2060 taught by Professor Baufer during the Spring '08 term at FSU.

Page1 / 52

Chapter 11 - Succeeding with Technology, 4th ed >...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online