tailieunhanh - Lecture Computing for management - Chapter 20

Lecture 20 - Security in information technology. After studying this chapter you will be able to understand: What is information security? Control? What is vulnerable? Why systems are vulnerable? Vulnerability and challenges, computer security threats and types, why internet is vulnerable? Business values of computer security and control. | Security in Information Technology Lecture 20 Summary of Previous Lecture In previous lecture we have covered, Introduction to Information System Planning Types of planning Why is planning so difficult? The Changing World of Planning Traditional Strategy-Making Today’s Sense-and-Respond Approach Summary of Previous Lecture Seven Planning Techniques Stages of Growth Critical Success Factors Competitive Forces Model Five Forces Analysis of the Internet Value Chain Analysis E-Business Value Matrix Linkage Analysis Planning Scenario Planning Today’s Lecture What is information Security? Control? What is Vulnerable? Why systems are vulnerable? Vulnerability and Challenges. Computer Security Threats and Types Hacking Tapping Sniffing Today’s Lecture Spoofing Denial of Service Attack Malwares and its types Why Internet is Vulnerable? Wi-Fi Threats example Computer Crime More examples of Vulnerabilities. Software Vulnerability Business Values of Computer Security and Control. Related Laws Today’s Lecture Information System Control Manual and automated control General and application control. Risk Assessment Security Policy Identity Management Disaster Recovery Plan Information Security Audit Today’s Lecture Technologies and Tools for Protection Identity management software Firewall Intrusion detection system Encryption Digital certificate and keys Summary Why Talk about Security? Why Talk about Security? What is Information Security? Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. The terms information security, computer security and information assurance are frequently used interchangeably. Control Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards Vulnerable Vulnerable: Capable of being attacked or damaged. Vulnerability: A flaw, . | Security in Information Technology Lecture 20 Summary of Previous Lecture In previous lecture we have covered, Introduction to Information System Planning Types of planning Why is planning so difficult? The Changing World of Planning Traditional Strategy-Making Today’s Sense-and-Respond Approach Summary of Previous Lecture Seven Planning Techniques Stages of Growth Critical Success Factors Competitive Forces Model Five Forces Analysis of the Internet Value Chain Analysis E-Business Value Matrix Linkage Analysis Planning Scenario Planning Today’s Lecture What is information Security? Control? What is Vulnerable? Why systems are vulnerable? Vulnerability and Challenges. Computer Security Threats and Types Hacking Tapping Sniffing Today’s Lecture Spoofing Denial of Service Attack Malwares and its types Why Internet is Vulnerable? Wi-Fi Threats example Computer Crime More examples of Vulnerabilities. Software Vulnerability Business Values of Computer Security and Control. Related Laws .

TÀI LIỆU MỚI ĐĂNG
15    194    0    22-05-2024
33    139    0    22-05-2024
11    158    1    22-05-2024
11    108    0    22-05-2024
8    94    0    22-05-2024
6    93    0    22-05-2024
442    98    0    22-05-2024
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.