Laudon_MIS14_ch08

Please download to get full document.

View again

of 51
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Information Report
Category:

Documents

Published:

Views: 33 | Pages: 51

Extension: PDF | Download: 6

Share
Related documents
Description
eqweqweqweqwe
Tags
Transcript
  6.1 Copyright © 2014 Pearson Education, Inc.     Securing Information Systems Chapter 8 VIDEO CASES Case 1: Stuxnet and Cyber Warfare Case 2: Cyber Espionage: The Chinese Threat Case 3: UBS Access Key: IBM Zone Trusted Information Channel Instructional Video 1: Sony PlayStation Hacked; Data Stolen from 77 million users Instructional Video 2: Zappos Working To Correct Online Security Breach Instructional Video 3: Meet the Hackers: Anonymous Statement on Hacking SONY  8.2 Copyright © 2016 Pearson Education, Inc.   Management Information Systems Chapter 8: Securing Information Systems ã Explain why information systems are vulnerable to destruction, error, and abuse. ã Describe the business value of security and control. ã Describe the components of an organizational framework for security and control. ã Describe the tools and technologies used for safeguarding information resources. Learning Objectives  8.3 Copyright © 2016 Pearson Education, Inc.   Management Information Systems Chapter 8: Securing Information Systems ã Problem: Massive data breach; using old security practices ã Solution: Initiative to use minimal up-to-date industry practices, for example, salting passwords ã Illustrates the need for security practices to keep up with current standards and threats ã Demonstrates the lack of regulation for corporate computer security and social network data security; poor data protection by many companies You're on LinkedIn? Watch Out!  8.4 Copyright © 2016 Pearson Education, Inc.   Management Information Systems Chapter 8: Securing Information Systems ã Security:  – Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems ã Controls:  – Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards System Vulnerability and Abuse
Related Search
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks