COMM 226 Lecture Notes - Lecture 12: Social Insurance Number, Personal Information Protection And Electronic Documents Act, Information Security

45 views4 pages

Document Summary

How should organizations respond to security incidents: understanding and managing security threats to organizations, understanding threats to your own privacy will help make you more sensitive to the importance of security and privacy. Three sources of security threats are: human errors and mistakes, accidental problems, poorly written programs, poorly designed procedures, physical accidents, malicious human activity. Intentional destruction of data: destroying system components, hackers, virus and worm writers, criminals, terrorists, natural events and disasters, fires, floods, hurricanes, earthquakes, tsunamis, avalanches, tornados, and other acts of nature. Initial losses of capability and service: plus losses from recovery actions. Five types of security problems are: unauthorized data disclosure, incorrect data modification, faulty service, denial of service, loss of infrastructure. Involves hardware and software components: user names and passwords. Identification: authentication, smart cards, personal identification number (pin, biometric authentication, fingerprints, facial scans, retina scans, single sign-on for multiple systems, encryption and firewalls, malware protection, viruses, worms, spyware, adware, malware safeguards.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents