Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Presentation MIS Nimesh

Presentation MIS Nimesh

Ratings: (0)|Views: 5 |Likes:
Published by rajain_rain

More info:

Published by: rajain_rain on Jul 30, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPTX, PDF, TXT or read online from Scribd
See more
See less

12/29/2010

pdf

text

original

 
System Vulnerability and Abuse
When data is stored in digital form, it is more vulnerablethan when it exists in manual form.Security refers to the policies, procedures, and technicalmeasures used to prevent unauthorized access, alteration,theft, or physical damage to information systems.
Controls
consist of all the methods, policies, andorganizational procedures that ensure the safety of theorganization's assets; the accuracy and reliability of itsaccounting records; and operational adherence tomanagement standards.
 
C
ont.
Threats to computerized information systemsinclude hardware and software failure; user errors; physical disasters such as fire or power failure; theft of data, services, and equipment;unauthorized use of data; and telecommunicationsdisruptions.
On-line systems and telecommunications areespecially vulnerable because data and files can be immediately and directly accessed throughcomputer terminals or at points in thetelecommunications network.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->