INSY 2299 Lecture Notes - Lecture 11: It Risk
![](https://new-preview-html.oneclass.com/eJn8zGYplZMrjX3pOxrlmxoyWAR13L2a/bg1.png)
Security
IT Security
Protection against…
oLoss of, damage to IT resources (hardware/software)
oUnauthorized use of IT resources
Data (Information) Security
Data can be stolen, altered, lost, and/or destroyed…
…by break-ins, interception, impersonation, technical glitches/failures, and/or human
error (and other human behaviors)
Preventative Measures
Encryption: Scrambling data so that it can’t be understood if intercepted/stolen
Backups: Protecting data from destruction/loss
Firewalls: Blocking data that shouldn’t be entering/exiting a network
Other behavioral and technological solutions
oPrevention often starts with people
Other Security Issues
Buyer & Seller Fraud
oBuyer fraud costs companies millions of dollars, the costs of which are passed on
to consumers
IT Risk Assessment: The need to assess risks and consider potential consequences
Business Continuity Plans: Predetermined plans of how a company will function in the
event of its technology going down
oIncreasingly important because more and more of business is being facilitated
by technology
Privacy
“The right to be left alone”
oFree from surveillance (no tracking)
oFree from intrusion (no spam, telemarketing, etc.)
*Security breaches can lead to privacy violations*
Privacy can be invaded with or without a security breach
find more resources at oneclass.com
find more resources at oneclass.com
Document Summary
Protection against : loss of, damage to it resources (hardware/software, unauthorized use of it resources. Data can be stolen, altered, lost, and/or destroyed . By break-ins, interception, impersonation, technical glitches/failures, and/or human error (and other human behaviors) Encryption: scrambling data so that it can"t be understood if intercepted/stolen. Firewalls: blocking data that shouldn"t be entering/exiting a network. Other behavioral and technological solutions: prevention often starts with people. Buyer & seller fraud: buyer fraud costs companies millions of dollars, the costs of which are passed on to consumers. It risk assessment: the need to assess risks and consider potential consequences. Business continuity plans: predetermined plans of how a company will function in the event of its technology going down: increasingly important because more and more of business is being facilitated by technology. The right to be left alone : free from surveillance (no tracking, free from intrusion (no spam, telemarketing, etc. )