Information System Management

Information System Management

  • Submitted By: S-_kirtu
  • Date Submitted: 05/10/2016 8:48 AM
  • Category: Business
  • Words: 3328
  • Page: 14

Chapter 8

Securing Information
Systems
VIDEO CASES
Case 1: Stuxnet and Cyber Warfare
Case 2: Cyber Espionage: The Chinese Threat
Case 3: UBS Access Key: IBM Zone Trusted Information Channel
Instructional Video 1: Sony PlayStation Hacked; Data Stolen from 77 million users
Instructional Video 2: Zappos Working To Correct Online Security Breach
Instructional Video 3: Meet the Hackers: Anonymous Statement on Hacking SONY
6.1

Copyright © 2014 Pearson Education, Inc.

Management Information Systems
Chapter 8: Securing Information Systems

Learning Objectives

• Explain why information systems are
vulnerable to destruction, error, and abuse.
• Describe the business value of security and
control.
• Describe the components of an organizational
framework for security and control.
• Describe the tools and technologies used for
safeguarding information resources.
8.2

Copyright © 2016 Pearson Education Ltd.

Management Information Systems
Chapter 8: Securing Information Systems

“MiniDuke” Exposes EU Cybersecurity Gaps

• Problem: Massive data breach; new sandboxevading techniques
• Solution: Initiative to implement a common
cybersecurity strategy.
• Demonstrates the lack of a centralized approach to
cybersecurity that leaves nations vulnerable to
national security breaches

8.3

Copyright © 2016 Pearson Education Ltd.

Management Information Systems
Chapter 8: Securing Information Systems

System Vulnerability and Abuse

• Security:
– Policies, procedures, and technical measures used to
prevent unauthorized access, alteration, theft, or
physical damage to information systems

• Controls:
– Methods, policies, and organizational procedures
that ensure safety of organization’s assets; accuracy
and reliability of its accounting records; and
operational adherence to management standards
8.4

Copyright © 2016 Pearson Education Ltd.

Management Information Systems
Chapter 8: Securing Information Systems...

Similar Essays