Lec wk 15 - security-Student - Securing Information Systems...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Securing Information Systems
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
OBJECTIVES v Analyze why information systems need special protection from destruction, error, and abuse. v Assess the business value of security and control. v Design an organizational framework for security and control. v Evaluate the most important tools and technologies for safeguarding information resources. 2
Background image of page 2
Computer Crime and Cyberterrorism Computer crime: “any violations of criminal law that involve knowledge of computer technology for their perpetration, investigation, or prosecution” –U.S. Department of Justice U.S. companies lose $14 billion annually to cybercrime Identity theft: phishing, evil twins, pharming, computer abuse [spamming]) Cyberterrorism and cyberwarfare 3 System Vulnerability and Abuse
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Worldwide Damage from Digital Attacks 4 System Vulnerability and Abuse
Background image of page 4
Phishing: A Costly New Sport for Internet Users v Problem: Large number of vulnerable users of online financial services, ease of creating bogus Web sites v Solutions: Deploy anti-phishing software and services and a multilevel authentication system to identify threats and reduce phishing attempts Deploying new tools, technologies, and security procedures, along with educating consumers, increases reliability and customer confidence Illustrates digital technology as part of a multilevel solution 5 System Vulnerability and Abuse
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
System Vulnerability An unprotected computer connected to the Internet may be disabled within a few seconds! Security: measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems Controls: procedures that ensure the safety of the organization’s assets; the accuracy and reliability of its accounting records; and operational adherence to management standards 6 System Vulnerability and Abuse
Background image of page 6
Why Systems Are Vulnerable v Hardware problems: breakdowns, configuration
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 23

Lec wk 15 - security-Student - Securing Information Systems...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online