ITM 102 Lecture Notes - Lecture 10: Intrusion Detection System, Phishing, Trojan Horse
Document Summary
Info systems are mission critical for many organizations. Without proper security measures, these systems would be next to impossible to use and take advantage of. Security: policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. It/is security measures are a special case of organizational controls. Controls: methods, policies, and organizational procedures that ensure safety of organizations assets, accuracy and reliability of its accounting records and operational adherence to management standards. Failed computer systems can lead to signi cant or total loss of business function. Firms now more vulnerable than ever con dential personal and nancial data and trade secrets, new products, and strategies. A security breach may cut into rm"s market value almost immediately. Inadequate security and controls also bring forth issues of liability. Hardware problems (breakdowns, con guration errors, damage from improper use, or crime) Software problems (programming errors, installation errors, or unauthorized changes)