ITM 100 Lecture Notes - Lecture 8: Information Technology Management, Certificate Authority, Outsourcing
sg418230 and 39832 others unlocked
14
ITM 100 Full Course Notes
Verified Note
14 documents
Document Summary
If you operate a business, security and control need to be a top priority. Security refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to info systems. Controls are methods, policies, and organizational procedures that ensure the safety of the organization"s assets, the accuracy and reliability of its records, and operational adherence to management standards. Because info systems in different location are interconnected, the potential for unauthorized access, abuse, or fraud can happen at any access point in the network. Users at the client layer can cause harm by introducing errors or by accessing systems without authorization. Systems malfunction if computer hardware breaks down, is not configured properly or is damaged by improper use or criminal acts. Large public networks are more vulnerable than internal networks because they"re virtually open to anyone.