ITM 102 Lecture Notes - Personal Information Protection And Electronic Documents Act, Data Integrity, Cyberwarfare

65 views7 pages

Document Summary

When large amounts of data are stored in electronic form, they are vulnerable to many more kinds of threats. Security refers to the policies, procedures, and technical measures used to prevent unauthorized. Controls are methods, policies, and organizational procedures that ensure that safety of the organization"s assets, the accuracy and reliability of its records, and operational adherence to management standards. Possible to access data flowing over networks, steal valuable data during transmission, or alter messages without authorization. System malfunction if computer hardware breaks down, is into configured properly, or is damaged by improper use or criminal acts. Power failures, floods, fires can disrupt computer systems. Domestic or offshore partnering with another company adds to system vulnerability if valuable information resides on networks and computers outside the organization"s control. Large public networks are more vulnerable than internal networks because they are virtually open to anyone. When abuses do occur, they can have an enormously widespread impact.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents