ADM2372.Chap09-Part II - 1 ADM2372 Management Information...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 1 ADM2372 Management Information Systems (MIS) Chapter 9 Part II Chapter 9 Part II Information Security Information Security 2 Agenda Information Security http://www.corporatemissionprotection.com/Information-Security.aspx 3 Information security: What Information security : the protection of information from accidental or intentional misuse by persons inside or outside an organization How Much Will Downtime Cost Your Business? Organizational information is intellectual capital - it must be protected 4 Data Data Physical access It is easier to control access to physical data Data Data Data Information System Internet Internet Intra net Intra net Extra net Extra net Businesses want to remain open to their employees, partners, customers, & suppliers It is harder to control electronic access Hackers, viruses, etc. errors, vandalism, accidents Data Data Data Information System Internet Internet Intra net Intra net Extra net Extra net Businesses want to remain open to their employees, partners, customers, & suppliers It is harder to control electronic access Information security: why Source: Laudon and Laudon, Pearson Ed Canada 2008 5 Information security: the inside risk 38% of security incidents originate within the organization Employees have access to privileged info (passwords, magnetic cards, etc.) They may harm the integrity of systems/data intentionally or unintentionally They may share their password with other employees, friends & family members Hackers use social engineering to trick employees into revealing access credentials or other valuable information Hackers frequently use social engineering to obtain password Social engineering...
View Full Document

Page1 / 17

ADM2372.Chap09-Part II - 1 ADM2372 Management Information...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online