ISYS104 Lecture Notes - Key Escrow, Public Key Certificate, Smart Card

20 views3 pages
Chapter 12- Information security management
Q1: What Are the Sources and Types of Security Threats?
Unintentional human errors and mistakes
- Accidental problemsdeletions, copy-overs, operating errors
- Poorly written programs
Malicious human activity
- Intentional destruction by current and former employees
- Hackers
- Malware writers
Natural events and disasters
- Fires, floods, cyclones, earthquakes, tsunamis, avalanches, tornados
- Initial losses of capability: Loss of sales and services
Secondary losses from recovery actions
- Cost of replacing and recovering data
Denial of Service (DOS)
Human error
- Inadvertently shut down web server
Malicious denial-of-service attacks
- Flood web server with millions of requests for web pages
Natural disasters
Loss of Infrastructure
Accidental
- Water line breaks
Theft
Terrorist
- Bombs computer centre
Q2: What Are the Elements of a Security Program?
- Must be addressed in a systematic way
- Three components
Senior management involvement
- Must establish security policy
- Manage risk
Safeguards
- Protections against security threats
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows page 1 of the document.
Unlock all 3 pages and 3 million more documents.

Already have an account? Log in

Document Summary

Q1: what are the sources and types of security threats: unintentional human errors and mistakes. Poorly written programs: malicious human activity. Malware writers: natural events and disasters. Fires, floods, cyclones, earthquakes, tsunamis, avalanches, tornados. Initial losses of capability: loss of sales and services: secondary losses from recovery actions. Inadvertently shut down web server: malicious denial-of-service attacks. Flood web server with millions of requests for web pages: natural disasters. Must be addressed in a systematic way. Must plan for prior to security incidents. A key is a number used to encrypt the data. Computer program uses the encryption method to convert non-coded message into coded message. Symmetric encryption = same key used to encode and decode. Asymmetric encryption = one key encodes, another key decodes. Computer devices that prevent unauthorised network access. Malware is viruses, trojan horses, worms, spyware and adware: spyware. Reside in background, monitor user actions, keystrokes, computer activity: adware.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents