Lecture Introduction to MIS: Chapter 5 - Jerry Post

Chapter 5 introduce the networks and telecommunications. After completing this chapter, you will be able to understand: How do you protect your information resources? What are the primary threats to an information system? What primary options are used to provide computer security? What non-computer-based tools can be used to provide additional security?,. | Introduction to MIS Chapter 5 Computer Security Jerry Post Technology Toolbox: Assigning Security Permissions Technology Toolbox: Encrypting E-Mail?? Cases: Professional Sports 1 Outline How do you protect your information resources? What are the primary threats to an information system? What primary options are used to provide computer security? What non-computer-based tools can be used to provide additional security? How do you protect data when unknown people might be able to find it or intercept it? What additional benefits can be provided by encryption? How do you prove the allegations in a computer crime? What special security problems arise in e-commerce? 2 Computer Security Server Attacks + Physical Dangers Data interception + external attackers The Internet Monitoring/ Spyware Internal + Privacy Employees & Consultants Links to business partners Outside hackers Threats to Information Accidents & Disasters Employees & Consultants Business Partnerships Outside Attackers Viruses & Spyware Direct attacks & Scripts Virus hiding in e-mail or Web site. 4 Security Categories Logical Unauthorized disclosure Unauthorized modification Unauthorized withholding, Denial of Service Confidentiality, Integrity, Accessibility (CIA) Physical attack & disasters Backup--off-site Physical facilities Cold/Shell site Hot site Disaster tests Personal computers Continuous backup Behavioral Users give away passwords Users can make mistakes Employees can go bad 5 Robert Morris--1989 Graduate Student Unix “Worm” Internet--tied up for 3 days Clifford Stoll--1989 The Cuckoo’s Egg Berkeley Labs Unix--account not balance Monitor, false information Track to East German spy: Marcus Hess Old Techniques Salami slice Bank deposit slips Trojan Horse Virus Security Pacific--Oct. 1978 Stanley Mark Rifkin Electronic Funds Transfer $ million Switzerland Soviet Diamonds Came back to . Hacker/youngster: Seattle Physically stole some computers and was arrested Sentenced to prison, scheduled to | Introduction to MIS Chapter 5 Computer Security Jerry Post Technology Toolbox: Assigning Security Permissions Technology Toolbox: Encrypting E-Mail?? Cases: Professional Sports 1 Outline How do you protect your information resources? What are the primary threats to an information system? What primary options are used to provide computer security? What non-computer-based tools can be used to provide additional security? How do you protect data when unknown people might be able to find it or intercept it? What additional benefits can be provided by encryption? How do you prove the allegations in a computer crime? What special security problems arise in e-commerce? 2 Computer Security Server Attacks + Physical Dangers Data interception + external attackers The Internet Monitoring/ Spyware Internal + Privacy Employees & Consultants Links to business partners Outside hackers Threats to Information Accidents & Disasters Employees & Consultants Business Partnerships Outside Attackers Viruses

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
12    76    2    21-05-2024
10    69    1    21-05-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.