ISYS104 Lecture Notes - Lecture 12: Database Administrator, Backup Site, Symmetric-Key Algorithm
Document Summary
Senior management involvement -> policies and procedures, manage risks. Safe guards-> protection mechanism for all 5 components of information system. Incident response- plan on how to respond to an incident. Once you authenticate, lets you log on to multiple systems. However, password in the network and be sent to many times. Both sender and receiver use the same key. C text + private key -> decrypt -> text. Program that is used to carry out a malicious activity. E. g. keystroke monitor, user action monitor, spy camera. Hash: algorithm used is a one way function. For every entry it will create a unique hash digest. Position definition- defining job rules (duties listed, "least access") Dissemination and enforcement- general training, and position specific training. Unfriendly: security guard, notify the person on the day to leave, lock account. Account management: creating accounts, updating and deleting, reminder to safe guard to account. Help desk policies: support (reset-> after security questions)