Class Notes (836,128)
United States (324,350)
SMG IS 223 (35)
Lecture 13

SMG IS 223 Lecture 13: Notes - Information Security

6 Pages
Unlock Document

Information Systems
SMG IS 223
Stephanie Watts

Information Security System Vulnerability and Abuse o Why systems are vulnerable When large amounts of data are stored digitally, on computers and servers and in databases, they are vulnerable to many more kinds of threats than when stored in manualphysical form o Hardware Problems Breakdowns, configuration errors, damage from improper use or crime o Software Problems Programming errors, installation errors, unauthorized changes o Disasters Power failures, flood, fires, etc. o Use of networks and computers outside of firms control Domestic or offshore outsourcing vendors Internet Vulnerabilities o Biggest Internet vulnerability hackers Network open to anyone Size of Internet means abuses can have wide impact When Internet becomes part of the corporate network, the organizations information systems are more vulnerable to actions from outsiders Use of fixed Internet addresses with permanent connections to Internet eases identification by hackers Email attachments Email used for transmitting trade secrets IM messages lack security, can be easily intercepted
More Less

Related notes for SMG IS 223

Log In


Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.