tailieunhanh - Lecture Business data communications and networking (8e): Chapter 11 - Jerry Fitzgerald, Alan Dennis
Chapter 11 - Network security. In this chapter, the following content will be discussed: Introduction; risk assessment; controlling disruption, destruction and disaster; controlling unauthorized access; best practice recommendations. | Business Data Communications and Networking 8th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Prof. M. Ulema Manhattan College Computer Information Systems 11 - Copyright 2005 John Wiley & Sons, Inc Chapter 11 Network Security 11 - Copyright 2005 John Wiley & Sons, Inc Outline Introduction Risk assessment Controlling disruption, destruction and disaster Controlling unauthorized access Preventing, detecting, and correcting Unauthorized Access Best practice recommendations 11 - Copyright 2005 John Wiley & Sons, Inc Introduction Security - always a major business concern Protection of physical assets with locks, barriers, guards, etc Protection of information with passwords, coding Introduction of computers and Internet Redefined the nature of information security Laws and enforcement Slow to catch-up Now a federal crime in the . (breaking into a computer) New laws against cyberborder crimes; difficult to enforce 11 - Copyright 2005 John Wiley & | Business Data Communications and Networking 8th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Prof. M. Ulema Manhattan College Computer Information Systems 11 - Copyright 2005 John Wiley & Sons, Inc Chapter 11 Network Security 11 - Copyright 2005 John Wiley & Sons, Inc Outline Introduction Risk assessment Controlling disruption, destruction and disaster Controlling unauthorized access Preventing, detecting, and correcting Unauthorized Access Best practice recommendations 11 - Copyright 2005 John Wiley & Sons, Inc Introduction Security - always a major business concern Protection of physical assets with locks, barriers, guards, etc Protection of information with passwords, coding Introduction of computers and Internet Redefined the nature of information security Laws and enforcement Slow to catch-up Now a federal crime in the . (breaking into a computer) New laws against cyberborder crimes; difficult to enforce 11 - Copyright 2005 John Wiley & Sons, Inc Computer Security Incidents Growing at a rate of 100% per year 1988: a virus shut down 10% of the computers on the Internet Establishment of Computer Emergency Response Team (CERT) with US DoD support Number of Incidents Reported to CERT 11 - Copyright 2005 John Wiley & Sons, Inc Financial Impact of Security 2003 Computer Security Institute/FBI Computer Crime and Security Survey 90% of the respondents reported security breaches in the last 12 months 75% reported a financial loss due to security breaches Average loss: $2 million Worldwide total annual cost of security losses Exceeds $2 trillion Reason for the increase in security problems Availability of sophisticated tools to break into networks 11 - Copyright 2005 John Wiley & Sons, Inc Why Networks Need Security Organizations becoming vulnerable Becoming increasingly dependent on computers, networks Becoming increasingly vulnerable to due widely available Internet access to its computers and networks Huge losses .
đang nạp các trang xem trước