Professional Documents
Culture Documents
Security and Control in Information System: 3) Response 1) Prevention 2) Detection
Security and Control in Information System: 3) Response 1) Prevention 2) Detection
INFORMATION
SYSTEM CONCERNS
UNINTENTIONAL INTENTIONAL
THREATS THREATS
GOALS OF
INFORMATION
SECURITY
1) Prevention 3) Response
2) Detection
RISK
TO:
HARDWARE
APPLICATION & DATA
BLACKOUT & BROWNOUT
COMPUTER CRIME
HACKING NATURAL DISASTER
CYBER THEFT
PIRACY OF INTELLECTUAL PROPERTY
SOFTWARE PRIVACY
UNATHORIZED USE AT WORK
Major Types of
Defense Strategies
1. ENCRYPTION
2. AUTHENTICATION
3. FIREWALLS
4. EMAIL MONITORING
5. VIRUS DEFENSES
5 MAJOR
CHARACTERISTICS OF
FIREWALL