MCS 2020 Chapter Notes -Managed Security Service, Information System, Management System
Document Summary
Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. 27 percent - home pcs connected to virtual private networks (vpns) (time to send a consistent message on security, jon oltsik, cnet news. com feb. Security professionals were asked to identify the most common sources of automated worm attacks. Not surprisingly, three of the top four causes pointed directly at dirty pcs. Use of fixed internet addresses with cable or dsl modems. Additional information & graphics: laudon (2012), management information. Any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution . Recruiting victims of computer crimes to help hunt down the hackers. How might this information be acquired? e. g. , phishing. Security threats often originate inside an organization: sloppy security. Commercial software contains flaws: hidden bugs flaws intruders. Patches: small pieces of software to repair flaws.