ISYS104 Lecture Notes - Lecture 12: Database Administrator, Backup Site, Symmetric-Key Algorithm

33 views2 pages

Document Summary

Senior management involvement -> policies and procedures, manage risks. Safe guards-> protection mechanism for all 5 components of information system. Incident response- plan on how to respond to an incident. Once you authenticate, lets you log on to multiple systems. However, password in the network and be sent to many times. Both sender and receiver use the same key. C text + private key -> decrypt -> text. Program that is used to carry out a malicious activity. E. g. keystroke monitor, user action monitor, spy camera. Hash: algorithm used is a one way function. For every entry it will create a unique hash digest. Position definition- defining job rules (duties listed, "least access") Dissemination and enforcement- general training, and position specific training. Unfriendly: security guard, notify the person on the day to leave, lock account. Account management: creating accounts, updating and deleting, reminder to safe guard to account. Help desk policies: support (reset-> after security questions)

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents