ITM 102 Chapter 8: ITM102 - Chapter 8 (Textbook Notes)

67 views18 pages

Document Summary

Security refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. Controls are methods, policies, and organizational procedures that ensure the safety of the organization"s assets, the accuracy and reliability of its records, and operational adherence to management standards. When large amounts of data are stored in electronic form, they are vulnerable to many more kinds of threats than when they existed in manual form. o. Through communications networks, information systems in different locations are interconnected. o. The potential for unauthorized access, abuse, or fraud is not limited to a single location but can occur at any access point in the network o. In the multi-tier client/server computing environment illustrated here, vulnerabilities exist at each layer and in the communications between the layers. Users at the client layer can cause harm by introducing errors or by accessing systems without authorization.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents