Chapter 10 - Chapter 10 information system security 1....

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 10 information system security 1. Information systems security Ω information systems security precautions taken to keep all aspects of information systems safe from unauthorized use or access 2. Primary threats to information systems security Ω accidents and natural disasters e.g. Inexperienced or careless computer operators Ω employees and consultants e.g. People within an organization who have access to electronic files Ω links to outside business contacts e.g. Electronic information can be at risk when it travels between or among business affiliates as part of doing business Ω outsiders e.g. Hackers and crackers who penetrate networks and computer systems to snoop or to cause damage 3. Unauthorized access Ω occurs whenever people who are not authorized to see, manipulate or otherwise handle information look through electronically stored information files for interesting or useful data, peek at monitors displaying proprietary or confidential information, or intercept electronic information on way to its destination Ω can be gained by physically stealing computers stealing storage media, using someone else's password 4. Information modification Ω occurs when someone accesses electronic information and then changes the information in some way Ω computer viruses viruses consist of destructive code that can erase a hard drive, seize control of a computer or otherwise do damage Ω denial of service attacks occur when electronic intruders deliberately attempt to prevent legitimate users of a service from using that service, often by using up all of a system's resources create armies of zombie computers by infecting computers that are located in homes, schools and businesses with viruses or worms
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
5. Spyware, spam, and cookies Ω spyware any software that covertly gathers information about a user through a Internet connection without the user's knowledge adware free software paid for by advertisements appearing during the use
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/02/2012 for the course INFS 1602 taught by Professor Bradley during the Three '12 term at University of New South Wales.

Page1 / 5

Chapter 10 - Chapter 10 information system security 1....

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online