Managing Information Resources and Security: Information Technology For Management 6 Edition
Managing Information Resources and Security: Information Technology For Management 6 Edition
Managing Information Resources and Security: Information Technology For Management 6 Edition
2
Learning Objectives (Continued)
4
IS Vulnerability
Chapter 16 5
How a virus works
Threats to Information Security
A threat to an information resource is any danger to which a
system may be exposed.
Chapter 16 8
Unintentional Threats (Continued)
Chapter 16 9
Intentional Threats
10
Intentional Threats (Continued)
Hacker. An outside person who has penetrated a
computer system, usually with no criminal intent.
Two rules have been followed fairly closely in past court decision in
many countries:
The right of privacy is not absolutes. Privacy must be balanced
against the needs of society
The public’s right to know is superior to the individual’s right of
privacy.
Chapter 16
Defense Strategy - Controls
Controls
Controls evaluation. Identifies security deficiencies and
calculates the costs of implementing adequate control
measures.