Chapter 2
Chapter 2
Fifth Edition
Chapter 2
The Need for Security
Learning Objectives
• Upon completion of this material, you should be
able to:
– Recognize the business need for information security
– Understand the responsibility of both top management
and IT management in information security program.
– Identify and differentiate threats to information systems
from attacks against information systems.
– List the common development failures and errors that
result from poor software and system security efforts.
• If no threats existed,
resources could be used
exclusively to improve
systems that contain, use,
and transmit information.
• Threat of attacks on
information systems is a
constant concern.