MCS 2020 Chapter Notes -Managed Security Service, Information System, Management System

32 views7 pages

Document Summary

Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. 27 percent - home pcs connected to virtual private networks (vpns) (time to send a consistent message on security, jon oltsik, cnet news. com feb. Security professionals were asked to identify the most common sources of automated worm attacks. Not surprisingly, three of the top four causes pointed directly at dirty pcs. Use of fixed internet addresses with cable or dsl modems. Additional information & graphics: laudon (2012), management information. Any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution . Recruiting victims of computer crimes to help hunt down the hackers. How might this information be acquired? e. g. , phishing. Security threats often originate inside an organization: sloppy security. Commercial software contains flaws: hidden bugs flaws intruders. Patches: small pieces of software to repair flaws.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents