Please enable JavaScript.
Coggle requires JavaScript to display documents.
Securing Information Systems (Tools and Technologies for Safeguarding…
Securing Information Systems
Why are information systems vulnerable
to destruction, error, and abuse
Factors
technical
organizational
environmental factors compounded by poor management
decisions.
Malicious Software
Viruses
Worms
Trojan Horses
Spyware
Hackers and Computer Crime
Internal Threats: Employees
What is the business value of security and
control
Legal and Regulatory Requirements for Electronic
Records Management
Electronic Evidence and Computer Forensics
the components of an organizational
framework for security and control
Information Systems Controls
Application controls
input controls
processing controls
output controls.
Risk Assessment
Security Policy
Ex : Passwords ; Identity Management
Disaster Recovery Planning and Business Continuity Planning
back up and the maintenance of backup computer systems or disaster recovery services.
The Role of Auditing
Tools and Technologies for Safeguarding Information Resources
Identity Management and Authentication
Firewalls, Intrusion Detection Systems, and Antivirus Software
Securing Wireless Networks
Encryption and Public Key Infrastructure
Ensuring System Availability
Security Issues for Cloud Computing and the Mobile Digital Platform
Ensuring Software Quality