ITSS 4370 Lecture Notes - Lecture 27: Information Security, Torchmark, Phishing

24 views3 pages

Document Summary

Information security performs four important functions for na organization. Enables safe operation of applications implemented on its it systems. Protects data the organization collects and uses. Organization, without data, loses its record of transactions and/or ability to deliver value to customer. Penalties, both official and market-based, exist for loss or breach of data. Protecting data in motion and data at rest are both critical aspects of. Confidentiality the ability to hide info from those people not authorized to view it. Integrity the ability to ensure that data is an accurate and unchanged representation of the original info. Availability the ability to make info readily accessible to those authorized to view it at all times. Vulnerabilities are weaknesses that allow specific threats to cause adverse effects. Exposure actual harm or possible harm. If (cid:373)a(cid:272)hi(cid:374)e (cid:374)ot (cid:862)pat(cid:272)hed(cid:863), (cid:271)ad guys can go in. Vulnerability weaknesses that may be exploited. Definition an observable occurrence in an information system or network.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers