ITM 100 Lecture Notes - Lecture 8: Information Technology Management, Certificate Authority, Outsourcing

52 views7 pages
sg418230 and 39832 others unlocked
ITM 100 Full Course Notes
14
ITM 100 Full Course Notes
Verified Note
14 documents

Document Summary

If you operate a business, security and control need to be a top priority. Security refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to info systems. Controls are methods, policies, and organizational procedures that ensure the safety of the organization"s assets, the accuracy and reliability of its records, and operational adherence to management standards. Because info systems in different location are interconnected, the potential for unauthorized access, abuse, or fraud can happen at any access point in the network. Users at the client layer can cause harm by introducing errors or by accessing systems without authorization. Systems malfunction if computer hardware breaks down, is not configured properly or is damaged by improper use or criminal acts. Large public networks are more vulnerable than internal networks because they"re virtually open to anyone.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents