INSY 2299 Lecture Notes - Lecture 11: It Risk

40 views1 pages
Security
IT Security
Protection against…
oLoss of, damage to IT resources (hardware/software)
oUnauthorized use of IT resources
Data (Information) Security
Data can be stolen, altered, lost, and/or destroyed…
…by break-ins, interception, impersonation, technical glitches/failures, and/or human
error (and other human behaviors)
Preventative Measures
Encryption: Scrambling data so that it can’t be understood if intercepted/stolen
Backups: Protecting data from destruction/loss
Firewalls: Blocking data that shouldn’t be entering/exiting a network
Other behavioral and technological solutions
oPrevention often starts with people
Other Security Issues
Buyer & Seller Fraud
oBuyer fraud costs companies millions of dollars, the costs of which are passed on
to consumers
IT Risk Assessment: The need to assess risks and consider potential consequences
Business Continuity Plans: Predetermined plans of how a company will function in the
event of its technology going down
oIncreasingly important because more and more of business is being facilitated
by technology
Privacy
“The right to be left alone”
oFree from surveillance (no tracking)
oFree from intrusion (no spam, telemarketing, etc.)
*Security breaches can lead to privacy violations*
Privacy can be invaded with or without a security breach
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows half of the first page of the document.
Unlock all 1 pages and 3 million more documents.

Already have an account? Log in

Document Summary

Protection against : loss of, damage to it resources (hardware/software, unauthorized use of it resources. Data can be stolen, altered, lost, and/or destroyed . By break-ins, interception, impersonation, technical glitches/failures, and/or human error (and other human behaviors) Encryption: scrambling data so that it can"t be understood if intercepted/stolen. Firewalls: blocking data that shouldn"t be entering/exiting a network. Other behavioral and technological solutions: prevention often starts with people. Buyer & seller fraud: buyer fraud costs companies millions of dollars, the costs of which are passed on to consumers. It risk assessment: the need to assess risks and consider potential consequences. Business continuity plans: predetermined plans of how a company will function in the event of its technology going down: increasingly important because more and more of business is being facilitated by technology. The right to be left alone : free from surveillance (no tracking, free from intrusion (no spam, telemarketing, etc. )

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers