ITM 100 Lecture Notes - Lecture 10: Information System, Sql Injection, Rogue Security Software

78 views4 pages
sg418230 and 39832 others unlocked
ITM 100 Full Course Notes
14
ITM 100 Full Course Notes
Verified Note
14 documents

Document Summary

Information systems are mission critical for many organizations. Without proper security measures, these systems would be next to impossible to use and take advantage of. Security: policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage. It/ts security measures are a special case of organizational controls. Controls: methods, policies, and organizational procedures that ensure safety of organization"s assets; accuracy and reliability of its accounting records, can"t access ryerson"s physical servers. Failed computer systems can lead to significant or total loss of business function. Firms now are more vulnerable than ever: confidential personal and financial data, trade secrets, new products. Hardware problems: breakdowns, config errors, damage. Software problems: programming errors, installation errors, unauthorized changes. Use of networks/computers outside of firm"s control. Size of internet means abuses can have wide impact. Use of fixed internet address with cable/dsl modems creates fixed targets for hackers. Email, p2p, im: interception, attachments with malicious software.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents