Lecture Security and Control


Management Information Systems



Download 0.85 Mb.
View original pdf
Page3/13
Date23.03.2021
Size0.85 Mb.
#56158
1   2   3   4   5   6   7   8   9   ...   13
securing information systems
Management Information Systems
Lecture 10 Security and Control
Figure 10-2


Computer viruses, worms, trojan horses

Spyware

Spoofing and Sniffers

Denial of Service (DoS) Attacks

Identity theft

Cyberterrorism and Cyberwarfare

Vulnerabilities from internal threats (employees
software flaws
Management Information Systems
Lecture 10 Security and Control
SYSTEM VULNERABILITY AND ABUSE
Malicious Software Viruses, Worms, Trojan Horses, and
Spyware
Hackers and Cybervandalism


SYSTEM VULNERABILITY AND ABUSE
Worldwide Damage from Digital Attacks
Management Information Systems
Lecture 10 Security and Control
Figure 10-3


Inadequate security and control may create serious
legal liability.

Businesses must protect not only their own information
assets but also those of customers, employees, and
business partners. Failure to do so can lead to costly

Download 0.85 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   ...   13




The database is protected by copyright ©ininet.org 2024
send message

    Main page