ITSS 4370 Lecture Notes - Lecture 27: Information Security, Torchmark, Phishing
Document Summary
Information security performs four important functions for na organization. Enables safe operation of applications implemented on its it systems. Protects data the organization collects and uses. Organization, without data, loses its record of transactions and/or ability to deliver value to customer. Penalties, both official and market-based, exist for loss or breach of data. Protecting data in motion and data at rest are both critical aspects of. Confidentiality the ability to hide info from those people not authorized to view it. Integrity the ability to ensure that data is an accurate and unchanged representation of the original info. Availability the ability to make info readily accessible to those authorized to view it at all times. Vulnerabilities are weaknesses that allow specific threats to cause adverse effects. Exposure actual harm or possible harm. If (cid:373)a(cid:272)hi(cid:374)e (cid:374)ot (cid:862)pat(cid:272)hed(cid:863), (cid:271)ad guys can go in. Vulnerability weaknesses that may be exploited. Definition an observable occurrence in an information system or network.