INFS1602 Lecture Notes - Lecture 11: Extraordinary Measures, Key Escrow, Intrusion Detection System

36 views10 pages

Document Summary

Information systems security is a trade-off between cost and risk. The target is the asset that is desired by the threat. Human errors and mistakes include accidental problems caused by both employees and non-employees. This category also includes poorly written application programs and poorly designed procedures. Computer crime includes employees and former employees who intentionally destroy data or other system components. It includes hackers who break into a system and virus and worm writers who infect computer systems. It also includes terrorists who break into a system and steal for financial gain. This includes fires, floods, hurricanes, earthquakes and other acts of nature. Problems include initial loss of capability and service, and losses stemming from actions to recover from them. Unauthorised data disclosure occurs when a threat obtains data that is supposed to be protected: human error: someone inadvertently releases data in violation of a policy; wikileaks. Computer crime: pretexting occurs when someone deceives by pretending to be someone else.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents