ITM 102 Chapter Notes - Chapter 8: Voice Over Ip, Managed Security Service, Radio Frequency
Document Summary
Internet vulnerabilities: network open to anyone, size of internet means abuses can have wide impact, use of fixed internet addresses with cable / dsl modems creates fixed targets for hackers, unencrypted voip, e-mail, p2p, im. Interception: attachments with malicious software, transmitting trade secrets. Wireless security challenges: radio frequency bands easy to scan. Internal threats: employees: security threats often originate inside an organization, sloppy security procedures. Inside knowledge: user lack of knowledge, social engineering, both end users and information systems specialists are sources of risk. Inadequate security and controls also bring forth issues of liability. Legal and regulatory requirements for electronic records management: hipaa, medical security and privacy rules and procedures, gramm-leach-bliley act, requires financial institutions to ensure the security and confidentiality of customer data, sarbanes-oxley act. Imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally.