Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 8: SECURING INFORMATION SYSTEMS - Coggle Diagram
CHAPTER 8: SECURING INFORMATION SYSTEMS
(1) SYSTEM VULNERABILITY AND ABUSE (324-335)
Security - m/s 324
Controls - m/s 324
Why System Vulnerable - m/s 324-325
Internet Vulnerabilities - m/s 326
Wireless Security Challenges - m/s 326-327
Malicious Software: Viruses, Worms, Trojan Horses and Spyware - m/s 327-329
Hackers and Computer Crime - m/s 330
Spoofing and Sniffing - m/s 330
Denial-of-Service Attacks - m/s 330-331
Computer Crime - m/s 331
Identity Theft - m/s 332-333
Click Fraud - m/s 333
Global Threats: Cyberterrorism and Cyberwarfare - m/s 333-334
Internal Threats: Employees - m/s 334-335
Software Vulnerability - m/s 335
(2) BUSINESS VALUE OF SECURITY AND CONTROL (336-338)
Legal and Regulatory Requirements for Electronic Records Management - m/s 336-337
Electronic Evidence and Computer Forensics - m/s 337-338
(3) ORGANIZATIONAL FRAMEWORKS FOR SECURITY AND CONTROL (338-
Information Systems Control - m/s 338-339
Risk Assessment - m/s 339-342
Security Policy - m/s 342-343
Disaster Recovery Planning and Business Continuity Planning - m/s 343-344
The Role Of Auditing - m/s 344
(4) TOOLS AND TECHNOLOGIES FOR SAFEGUARDING INFORMATION RESOURCES (344-353)
Identity Management and Authentication - m/s 345-346
Firewalls, Intrusion Detection Systems, and Antivirus Software - m/s 347
Firewalls - m/s 347-348
Intrusion Detection Systems - m/s 348
Antivirus and Antispyware Software - m/s 348
Unified Threat Management Systems - m/s 349
Securing Wireless Networks - m/s 349
Encryption and Public Key Infrastructure - m/s 349-351
Ensuring System Availability - m/s 351
Controlling Network Traffic: Deep Packet Inspection - m/s 351
Security Outsourcing - m/s 352
Security Issues for Cloud Computing and the Mobile Digital Platform - m/s 352
Security in the Cloud - m/s 352
Securing Mobile Platforms - m/s 353
Ensuring Software Quality - m/s 353