Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 10: ONLINE SECURITY - Coggle Diagram
CHAPTER 10: ONLINE SECURITY
Computer security
Computer security
Physical security
Threat
Logical security
Risk management
Applicable for protecting Internet
Four general organizational action
Establish a security policy
Any organization concerns about protecting its electronic commerce asset
Security policy should address physical security, network security and disaster recovery
Electronic threat example
Impostor
Eavesdropper
Cracker or hacker
Elements of computer security
Secrecy- protecting against unauthorized data
Necessity- preventing data delay
Integrity- preventing unauthorized data modification
Four steps creating a security policy
Determine which assets must be protected from which threats
Determine who needs access to various parts of the system of specific information assets
Identity resources available or needed to protect the information assets
Using the information gathered in the first three steps the organization develop written security policy