Professional Documents
Culture Documents
information resources
ALEENA CYROSH
99522501007
S3, MBA GENERAL
Protecting information resources in management information
systems involves employing various technologies and practices to
ensure confidentiality, integrity, and availability of data. Some key
technologies include:
● Firewalls
● Encryption
● Intrusion Detection and Prevention System (IDPS)
● Access control systems
● Antivirus Software
● Security Information and Event Management (SIEM)
● Multi-Factor Authentication (MFA)
● Regular Backups
● Security Patching
● Network Segmentation
● Security Policies and Training
● Biometric Authentication
1. FIREWALLS
● A firewall is a security device that can help
protect your internet network by filtering
unknown traffic and blocking outsiders from
gaining access to your private data.
● Multi-factor Authentication
(MFA) is an authentication
method that requires the user
to provide two or more
verification factors to gain
access to a resource such as an
application, online account, or
a VPN.
8. REGULAR BACKUPS
● Security patches are software and operating system updates that aim to fix
security vulnerabilities in a program or product.
● These updates literally “patch” a hole in your defense, preventing a hacker or
piece of malware from exploiting a way into your network.
● If you've seen a message that says your Android security patch level is too low,
you need to install an update to ensure that your device remains secure. A
patch is released to maintain software to keep it running smoothly and up-to-
date
11. SECURITY POLICIES AND TRAINING