ITM 102 Chapter Notes - Chapter 8: Voice Over Ip, Managed Security Service, Radio Frequency

90 views7 pages

Document Summary

Internet vulnerabilities: network open to anyone, size of internet means abuses can have wide impact, use of fixed internet addresses with cable / dsl modems creates fixed targets for hackers, unencrypted voip, e-mail, p2p, im. Interception: attachments with malicious software, transmitting trade secrets. Wireless security challenges: radio frequency bands easy to scan. Internal threats: employees: security threats often originate inside an organization, sloppy security procedures. Inside knowledge: user lack of knowledge, social engineering, both end users and information systems specialists are sources of risk. Inadequate security and controls also bring forth issues of liability. Legal and regulatory requirements for electronic records management: hipaa, medical security and privacy rules and procedures, gramm-leach-bliley act, requires financial institutions to ensure the security and confidentiality of customer data, sarbanes-oxley act. Imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents