ITM 102 Lecture Notes - Personal Information Protection And Electronic Documents Act, Data Integrity, Cyberwarfare
Document Summary
When large amounts of data are stored in electronic form, they are vulnerable to many more kinds of threats. Security refers to the policies, procedures, and technical measures used to prevent unauthorized. Controls are methods, policies, and organizational procedures that ensure that safety of the organization"s assets, the accuracy and reliability of its records, and operational adherence to management standards. Possible to access data flowing over networks, steal valuable data during transmission, or alter messages without authorization. System malfunction if computer hardware breaks down, is into configured properly, or is damaged by improper use or criminal acts. Power failures, floods, fires can disrupt computer systems. Domestic or offshore partnering with another company adds to system vulnerability if valuable information resides on networks and computers outside the organization"s control. Large public networks are more vulnerable than internal networks because they are virtually open to anyone. When abuses do occur, they can have an enormously widespread impact.