tailieunhanh - Lecture Management information systems (4th edition): Chapter 7 - Rainer, Prince, Watson

In this chapter, the learning objectives are: Introduction to information security, unintentional threats to information systems, deliberate threats to information systems, what organizations are doing to protect information resources, information security controls. | 7 Information Security Introduction to Information Security Unintentional Threats to Information Systems Deliberate Threats to Information Systems What Organizations Are Doing to Protect Information Resources Information Security Controls Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Compare and contrast human mistakes and social engineering, along with specific examples of each one. Discuss the 10 types of deliberate attacks. Describe the three risk mitigation strategies and examples of each one in the context of owning a home. Identify the three major types of controls that organizations can use to protect their information resources along with an example of each one. The St. Louis Cardinals Investigated for Hacking the Houston Astros Describe how the Cardinals apparently were able to gain access to the Astros’ computer system. What lessons should the Astros learn from this security breach? . | 7 Information Security Introduction to Information Security Unintentional Threats to Information Systems Deliberate Threats to Information Systems What Organizations Are Doing to Protect Information Resources Information Security Controls Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Compare and contrast human mistakes and social engineering, along with specific examples of each one. Discuss the 10 types of deliberate attacks. Describe the three risk mitigation strategies and examples of each one in the context of owning a home. Identify the three major types of controls that organizations can use to protect their information resources along with an example of each one. The St. Louis Cardinals Investigated for Hacking the Houston Astros Describe how the Cardinals apparently were able to gain access to the Astros’ computer system. What lessons should the Astros learn from this security breach? Introduction to Information Security Information Security Threat Exposure Vulnerability Five Key Factors Increasing Vulnerability Cybercrime Security: the degree of protection against criminal activity, danger, damage, and/or loss. Information Security: all of the processes and policies designed to protect an organization’s information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction. Threat: any danger to which a system may be exposed. Exposure: of an information resource is the harm, loss, or damage that can result if a threat compromises that resource. Vulnerability: the possibility that the system will be harmed by a threat. Cybercrime: refers to illegal activities conducted over computer networks, particularly the Internet. iDefense (), a company that specializes in providing security information to governments and Fortune 500 companies, maintains that groups of well-organized criminal .

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.