Information security

Information security - Information Security BMGT 301 Dr...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Information Security BMGT 301 Dr. Zeinab Karake Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems Security Security Goals 3 Integrity Confidentiality Availability C.I.A. • Hardware problems • Breakdowns, configuration errors, damage from improper use or crime • Software problems • Programming errors, installation errors, unauthorized changes • Disasters • Power failures, flood, fires, and so on • Use of networks and computers outside of firm’s control • E.g., with domestic or offshore outsourcing vendors Problems with IT Systems • Malware • Viruses • Harmful software program that attaches itself to other software programs or data files in order to be executed • Worms • Independent computer programs that copy themselves from one computer to other computers over a network Malicious Software •...
View Full Document

This note was uploaded on 12/02/2011 for the course BMGT 301 taught by Professor Wang during the Fall '08 term at Maryland.

Page1 / 14

Information security - Information Security BMGT 301 Dr...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online