You are on page 1of 14

NETIQUTTE

*When you enter the online class or google meet you


should have a great good morning or good afternoon
to your prof.
*Mute the mic when someone is speaking
*Avoid using capital letters in each word
*Avoid using emoji or stickers when sending an
email to prof
* I want to say before the end of google meet to
may prof is thank you or good bye
According to the dictionary of Military and
Associated Terms of the US Department of
Defense, information systems security is
“The protection of information and
information systems against unauthorized
access or modification of information,
whether in storage, processing, or transit,
and against denial of service .
*Why are information systems are
vulnerable to destruction,error and
abuse.
In short, if you operate a business today, you need to make
security and con trol a top priority. Security refers to the
policies, procedures, and technical mea sures used to prevent
unauthorized access, alteration, theft, or physical damage to
information systems

>Why system and Vulnerable


When large amounts of data are stored in electronic form, they
are vulnerable to many kinds of threats. Through
communications networks, information sys tems in different
locations are interconnected.
CONTEMPORARY SECURITY CHALLENGES AND VULNERABILITIES

WI-FI SECURITY CHALLENGES


*What is the business value of security
and control?
Companies have very valuable information assets to protect.
Systems often house confidential information about individuals’
taxes, financial assets, medi cal records, and job performance
reviews. They also can contain information on
corporateoperations, including trade secrets, new product
development plans, and marketing strategies. Government
systems may store information on weap ons systems, intelligence

Legal and Regulatory Requirements for Electronic


Records Management

Electronic Evidence and Computer Forensics


*What are the components of an
organizational framework for security and
control?

Even with the best security tools, your information


systems won’t be reliable and secure unless you
know how and where to deploy them.

>Information Systems Controls


>Risk Assessment
>Security Policy
>The Role of Auditing
*What are the most important tools and
technologies for safeguarding
information resources?
Businesses have an array of technologies for protecting their
information resources.
They include tools for managing user identities, preventing
unau
thorized access to systems and data, ensuring system availability
and ensuring software quality
>Identity Management and Authentication
-Authentication
-Biometric authentication
>Firewalls, Intrusion Detection Systems,
and Antivirus Software
Without protection against malware and intruders,
connecting to the Internet would be very dangerous.
Firewalls, intrusion detection systems, and antivirus
software have become essential business tools.
-Firewalls
- Intrusion Detection Systems
-Antivirus and Antispyware Software

- Unified Threat Management Systems


*Encryption and Public Key Infrastructure
-Many businesses use encryption to protect digital
information that they store, physically transfer, or send
over the Internet.
*Ensuring System Availability
As companies increasingly rely on digital networks for
revenue and opera tions, they need to take additional
steps to ensure that their systems and appli cations are
always available.

>Controlling Network Traffic: Deep Packet


Inspection
> Securing Mobile Platforms
*Ensuring Software Quality
In addition to implementing effective security and controls,
organizations can improve system quality and reliability by
employing software metrics and rig orous software testing.
Software metrics are objective assessments of the sys tem in
the form of quantified measurements.
IN OUR CLASS WE
DON'T DO EASY
WE MAKE EASY
HAPPEN THROUGH
HARD WORK AND
LEARNING

You might also like