Please enable JavaScript.
Coggle requires JavaScript to display documents.
CH 8: SECURING INFORMATION SYSTEMS (WHY AREINFORMATION SYSTEMS VULNERABLE…
CH 8: SECURING INFORMATION SYSTEMS
WHY AREINFORMATION SYSTEMS VULNERABLE TO DESTRUCTION, ERROR, AND ABUSE?
CONTEMPORARY SECURITY CHALLENGES AND VULNERABILITIES
INTERNET VULNERABILITIES
WIRELESS SECURITY CHALLENGES
MALICIOUS SOFTWARE: VIRUSES, WORMS, TROJAN HORSES, AND SPYWARE
HACKERS AND COMPUTER CRIME
INTERNAL THREAT: EMPLOYEES
SOFTWARE VULNERABILITY
WHAT IS THE BUSINESS VALUE OF SECURITY AND CONTROL?
LEGAL AND REGULATORY REQUIREMENTS FOR ELECTRONIC RECORDS MANAGEMENT
ELECTRONIC EVIDENCE AND COMPUTER FORENSICS
WHAT ARE THE COMPONENTS OF AN ORGANIZATIONAL FRAMEWORK FOR SECURITY AND
CONTROL?
INFORMATION SYSTEMS CONTROLS
RISK ASSESSMENT
SECURITY POLICY
DISASTER RECOVERY PLANNING AND BUSINESS CONTINUITY PLANNING
THE ROLE OF AUDITING
WHAT ARE THE MOST IMPORTANT TOOLS AND TECHNOLOGIES FOR SAFEGUARDING
INFORMATION RESOURCES?
IDENTITY MANAGEMENT AND AUTHENTICATION
FIREWALLS, INTRUSION DETECTION SYSTEMS, AND ANTIVIRUS SOFTWARE
SECURING WIRELESS NETWORKS
ENCRYPTION AND PUBLIC KEY INFRASTRUCTURE
ENSURING SYSTEM AVAILABILITY
SECURITY ISSUES FOR CLOUD COMPUTING AND THE MOBILE DIGITAL PLATFORM
ENSURING SOFTWARE QUALITY
Submitted by:MELATI KUSUMA (041611333189)
CANDRA PUTRA NUSWANTORO (041711333124)