Please enable JavaScript.
Coggle requires JavaScript to display documents.
Securing Information Systems (The most important tools and technologies…
Securing Information Systems
The business value of security and control
Legal and Regulatory Requirements for Electronic Records Management
Gramm-Leach-Bliley Act
Sarbanes-Oxley Act
HIPAA
Electronic Evidence and Computer Forensics
The most important tools and technologies for safeguarding information resources
Encryption and Public Key Infrastructure
Ensuring System Availability
Securing Wireless Networks
Security Issues for Cloud Computing and the Mobile Digital Platform
Firewalls, Intrusion Detection Systems, and Antivirus Software
Ensuring Software Quality
Identity Management and Authentication
The components of an organizational framework for security and control
Information Systems Controls
Application controls
specific controls unique to each computerized
application, such as payroll or order processing
Processing controls
Output controls
Input controls
Risk Assessment
determines the level of risk to the firm if a specific activity or process is not properly controlled
The reasons why information systems vulnerable to destruction, error, and abuse
Hackers and Computer Crime
Denial-of-Service Attacks
Computer Crime
Spoofing and Sniffing
Identity Theft
Phasing
Pharming
Global Threats: Cyberterrorism and Cyberwarfare
Click Fraud
Malicious Software: Viruses, Worms, Trojan Horses, and Spyware
Why Systems are Vulnerable
Wireless Security Challenges
Internet Vulnerabilities
Software Vulnerability
Bugs
zero-day vulnerabilities
Patches
Internal Threats: Employees
social engineering
Malicious intruders seeking system access sometimes trick employees into revealing their passwords by pretending to be legitimate members of the company in need of information.