Chapter 3 study guide 233

Chapter 3 study guide 233 - Chapter 3: Security With...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 3: Security With respect to network and system security, what do we mean by an organizationÕs Òthreat environment.Ó Describe the following network attacks/threats: Viruses; Worms; Spyware; Spam; Social Engineering; Phishing. How does SUÕs threat environment differ from JP Morgan ChaseÕs threat environment and why is this important? Viruses- pieces of code that attach themselves to other programs Worms- Stand along programs that do not attach themselves to programs. Instead, they propagate like viruses through email, and son. Phishing- when an email or website notice is released that looks like it would be from a legitment website asking for your information to update your account. Spyware- collects sensitive data and sends it to a hacker. Spam- unsolicited commercial email. Summarize the key activities that take place in the Plan-Protect- Respond cycle that companies follow to deal with the information technology threat environment. - first phase is the plan phase. Planning principles, risk analysis, comprehensive security defense in depth, minimum perissions. - Protect phase- ongoing protection, by access control, firewalls, cryptography, etc. -
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 3

Chapter 3 study guide 233 - Chapter 3: Security With...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online