Please enable JavaScript.
Coggle requires JavaScript to display documents.
SECURING INFORMATION SYSTEMS Chapter 8 (Tools and Technologies for…
SECURING INFORMATION SYSTEMS
Chapter 8
System Vulnerability and Abuse
Why systems are vulnerable
Internet Vulnerabilities
Wireless Security Challenge
Malicious Software
Computer virus
Worms
Trojan
SQL injection attacks
Ransomware
Spyware
Hackers and Computer Crime
Spoofing and Sniffing
Denial-of-Service Attacks
Computer Crime
Identity Theft
Click Fraud
Cyberterrorism and Cyberwarfare
Internet Threats : Employees
Forget their passwords
Allow coworkers to use theirs
Social engineering
Software Vulnerability
Hidden bugs or program code defects
Zero-day vulnerabilities
Business Value of Security and Control
Legal and Regulatory Requirements for Electronic Records Management
Health Insurance Portability and Accountability Act (HIPAA) of 1996
Gramm-Leach-Bliley Act
Sarbanes-Oxley Act
Electronic Evidence and Computer Forensics
Discovery request for access to information
Computer forensics
Framework for Security and Control
Information System Controls
General Controls
Application Controls
Risk Assessment
Security Policy
Disaster Recovery Planning and Business Continuity Planning
Auditing
Tools and Technologies for Safeguarding Information Resources
Identitiy Management and Authentication
Authentication
Passoword
Token
Smart card
Biometric Authentication
Two-factor authentication
Firewalls
Intrusion Detection Systems
Antivirus and Antispyware Software
Unified Threat Management Systems
Securing Wireless Networks
Encryption and Public Key Infrastructure
SSL
S-HTTP
Public Key Encryption
Digital Certificates
Public Key Infrastructure (PKI)
System Availability
Fault-tolerant computer systems
High-availability computing
Recovery-oriented computing
Deep Packet Inspection
Managed Security Service Providers (MSSPs)
Security Issues
Security in the Cloud
Securing Mobile Platforms
Softare Quality
Gabriella Handoyo
041611333147 / 9 /EC-AK