0% found this document useful (0 votes)
18 views11 pages

Management Information System: Chapter 8: Securing Information Systems

summary of MIS session 6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views11 pages

Management Information System: Chapter 8: Securing Information Systems

summary of MIS session 6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

MANAGEMENT

INFORMATION
SYSTEM

Chapter 8: SECURING INFORMATION SYSTEMS

Vu Quang Nguyen
IS VULNERABILITIES
TYPES of VULNERABILITIES

Malwares

VS

Hackers
MALWARES

Virus
Spyware

Ransomware Worm

SQL
Trojan horse
injection
HACKERS & COMPUTER CRIME
Spoofing

Click Fraud Sniffing

Phishing &
DoS &
Identity
DDoS
Theft
TYPES of VULNERABILITIES
TYPES of VULNERABILITIES
TYPES of VULNERABILITIES
IS CONTROL

Information Systems Controls

Auditing Risk Assessment

Security & Control

Recovery & Continuity Planning Security Policy


TOOLS & TECHNOLOGIES

Identity Management & Firewalls, Intrusion Detection


Authentication Systems & Anti-malware Software

Ensuring Software Quality Securing Wireless Network

Safeguarding Information
Resources
Securing Cloud Computing & Encryption & Public Key
Mobile Digital Platform Infrastructure

Ensuring System Availability Blockchain


THANK YOU!

You might also like