MGMT 3265 Chapter Notes - Chapter 8: Data Validation, Sql Injection, Denial-Of-Service Attack
Document Summary
Refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. Methods, policies, and organizational procedures that ensure the safety of the organization"s assets; the accuracy and reliability of its records; and operational adherence to management standards. *the most common threats against contemporary information systems can stem from technical, organizational, and environmental factors compounded by poor management decisions. *in the multi client/server computing environment, vulnerabilities exist at each layer and in the communications between the layers. *computers constantly connected to the internet by cable modems or digital subscriber line (dsl) lines are more open to penetration by outsiders, because they use fixed internet addresses where they can be easily identified. *telephone service based on internet technology is more vulnerable than the switched voice network if it does not run over a secure private network.