Please enable JavaScript.
Coggle requires JavaScript to display documents.
:computer: L & L Infosys CH 8: Securing Information Systems, What is a…
:computer:
L & L Infosys CH 8: Securing Information Systems
Why are information systems vulnerable to destruction, error and abuse?
What are the most common threats against information systems?
Difference between a virus, a worm, and a Trojan horse
What is a hacker?
How do they create security problems and damage systems?
Spoofing and sniffing
DOS/DDoS attacks
Define computer crime.
Give two examples of Computer Crime where computers are used as instruments of crime.
Click Fraud
CYBERWARFARE
Pharming
Evil Twins
Security and system unreliability due to employees and defects in system
Hidden bugs
Zero-day vulnerabilities
Software Patches
SQL injection attacks
Ransomware
Spyware
Keyloggers
Internet Vulnerabilities
Wireless security challenges
What is the business value of security and control?
How will inadequate security and control may result in serious legal liability?
What is the definition of electronic evidence? Why is it important?
What is computer forensics and how does it deal with problems pertaining to computer evidence?
Legal and Regulatory Requirments for Electronic Records Management
HIPAA
Gramm-Leach-Bliley Act
Sarbanes-Oxley Act
What are the components of an organizational framework for security and control?
What are general controls? What components are there?
What are application controls, and what components are there?
Security policy
Security policy
Identity management
Disaster recovery planning
Business continuity planning
What is the function of risk assessment? How is it conducted for information systems?
What are the most important tools and technologies for safeguarding information resources?
Security Issues in Cloud Computing and the Mobile Digital Platform
Securing the Cloud
Securing the Mobile Platforms
Ensuring Software quality: How does employing software metric help system quality and reliability?
Identity Management and Authentication
Firewalls, Intrusion Detection and Antivirus
How do firewalls work?
Antivirus and Antispyware software: explain the workings
Encryption and public key infrastructure
Secure Socket Layers (SSL)
HTTPS (S standing for Secure)
Public key Infrastructure
Public Key Infrastructure (PKI)
Ensuring System Availability
Fault-tolerant computer systems in Online TPS
Downtime
Deep Packet Inspection (DPI)
What is a token in authentication?
Smart card
What is Identity theft?
What is phishing?
Acceptable use policy
2FA: what is it and how does it reduce fraud, hacking and security breaches?
How does an intrusion detection system work?
What is a unified threat management system?
Digital certificates: how do they give the visitor a greater sense of security?
Outsourcing: Why would small businesses opt to use managed security service provisions?
Biometric authentication