This preview shows pages 1–3. Sign up to view the full content.
AACS3034 Managing Information Systems CHAPTER 7 CHAPTER 7: Managing System Security and ControlAfter reading this chapter, you will be able to: •Explain why information systems are vulnerable to destruction, error, and abuse. •Evaluate the most important tools and technologies for safeguarding information resources. •Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems 7.0 System Vulnerability and AbuseIf you operate a business today, you need to make securityand controltop priority. Security: Controls: •Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards. Why Systems Are Vulnerable Information systems are vulnerable to technical, organizational, and environmental threats from internal and external sources. The weakest link in the chain is poor system management. If managers at all levels don’t make security and reliability their number one priority, then the threats to an information system can easily become real. The figure below gives an idea of some of the threats to each component of a typical network. Figure 7-1: Contemporary Security Challenges and Vulnerabilities. The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network.
has intentionally blurred sections.
Sign up to view the full version.