tailieunhanh - Lecture Management information systems: Solving business problems with information technology – Chapter 4

Upon completion of this lesson, the successful participant will be able to understand: How do you store and retrieve the vast amount of data collected in a modern company? Why is the database management approach so important to business? How do you write questions for the DBMS to obtain data?,. | Introduction to MIS Chapter 4 Security, Privacy, Anonymity Outline Threats to Information Physical Security and Disaster Planning Logical Security and Data Protection Virus Threats User Identification and Biometrics Access controls Encryption and Authentication Internet Security Issues Privacy Anonymity Cases: Healthcare Appendix: Server Security Certificates Security, Privacy, and Anonymity Server Attacks Data interception The Internet Monitoring Employees & Consultants Links to business partners Outside hackers Threats to Information Accidents & Disasters Employees & Consultants Business Partnerships Outsiders Viruses Virus hiding in e-mail attachment. $$ Security Categories Physical attack & disasters Backup--off-site Cold/Shell site Hot site Disaster tests Personal computers! Logical Unauthorized disclosure Unauthorized modification Unauthorized withholding Denial of Service Horror Stories Security Pacific--Oct. 1978 Stanley Mark Rifkin Electronic Funds Transfer $ million Switzerland Soviet Diamonds Came back to . Equity Funding--1973 The Impossible Dream Stock Manipulation Insurance Loans Fake computer records Robert Morris--1989 Graduate Student Unix “Worm” Internet--tied up for 3 days Clifford Stoll--1989 The Cuckoo’s Egg Berkeley Labs Unix--account not balance Monitor, false information Track to East German spy Old Techniques Salami slice Bank deposit slips Trojan Horse Virus Manual v Automated Data Amount of data Identification of users Difficult to detect changes Speed Search Copy Statistical Inference Communication Lines SunGard is a premier provider of computer backup facilities and disaster planning services. Its fleet of Mobile Data Centers can be outfitted with a variety of distributed systems hardware and delivered at a disaster site within 48 hours. Disaster Planning Data Backup Backup is critical Offsite backup is critical Levels RAID (multiple drives) Real time replication Scheduled backups Data Backup Offsite backups are critical. . | Introduction to MIS Chapter 4 Security, Privacy, Anonymity Outline Threats to Information Physical Security and Disaster Planning Logical Security and Data Protection Virus Threats User Identification and Biometrics Access controls Encryption and Authentication Internet Security Issues Privacy Anonymity Cases: Healthcare Appendix: Server Security Certificates Security, Privacy, and Anonymity Server Attacks Data interception The Internet Monitoring Employees & Consultants Links to business partners Outside hackers Threats to Information Accidents & Disasters Employees & Consultants Business Partnerships Outsiders Viruses Virus hiding in e-mail attachment. $$ Security Categories Physical attack & disasters Backup--off-site Cold/Shell site Hot site Disaster tests Personal computers! Logical Unauthorized disclosure Unauthorized modification Unauthorized withholding Denial of Service Horror Stories Security Pacific--Oct. 1978 Stanley Mark Rifkin Electronic Funds Transfer $ million .

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.