You are on page 1of 3

SECURITY AND CONTROL IN INFORMATION SYSTEM

a wide range of activities, includes


products and processes to prevent
unauthorized access, modification
and deletion of information
knowledge, data and facts.

INFORMATION

SYSTEM CONCERNS

UNINTENTIONAL INTENTIONAL
THREATS THREATS

GOALS OF
INFORMATION
SECURITY

1) Prevention 3) Response

2) Detection
RISK
TO:

HARDWARE
APPLICATION & DATA
BLACKOUT & BROWNOUT
COMPUTER CRIME
HACKING NATURAL DISASTER
CYBER THEFT
PIRACY OF INTELLECTUAL PROPERTY
SOFTWARE PRIVACY
UNATHORIZED USE AT WORK

COMPUTER VIRUSES AND WORM

Major Types of
Defense Strategies

1. ENCRYPTION

2. AUTHENTICATION

3. FIREWALLS

4. EMAIL MONITORING

5. VIRUS DEFENSES

5 MAJOR
CHARACTERISTICS OF
FIREWALL

• A firewall computer screens all


network traffic for proper
 A firewall serves as a
passwords and other security.
“gatekeeper” computer system

• only allows authorized • Firewalls have become an


transmissions in and out of the essential component of
network.

You might also like