ITM 102 Chapter 8: ITM102 - Chapter 8 (Textbook Notes)
Document Summary
Security refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. Controls are methods, policies, and organizational procedures that ensure the safety of the organization"s assets, the accuracy and reliability of its records, and operational adherence to management standards. When large amounts of data are stored in electronic form, they are vulnerable to many more kinds of threats than when they existed in manual form. o. Through communications networks, information systems in different locations are interconnected. o. The potential for unauthorized access, abuse, or fraud is not limited to a single location but can occur at any access point in the network o. In the multi-tier client/server computing environment illustrated here, vulnerabilities exist at each layer and in the communications between the layers. Users at the client layer can cause harm by introducing errors or by accessing systems without authorization.