SlideShare a Scribd company logo
1 of 7
Question 1
Discuss some human safeguards for employees that can ensure
the security of information systems.
Your response should be at least 200 words in length. You are
required to use at least your textbook as source material for
your response. All sources used, including the textbook, must
be referenced; paraphrased and quoted material must have
accompanying citations.
Question 2
How should organizations respond to security threats?
Your response should be at least 200 words in length. You are
required to use at least your textbook as source material for
your response. All sources used, including the textbook, must
be referenced; paraphrased and quoted material must have
accompanying citations.
Question 3
Research disaster recovery plans (IS). Be sure to review your
lessons and assigned readings.
• Assume there are two generic companies, one with and the
other without a disaster recovery plan.
• Title your response under one of the following headings:
oReasons why the company survived
oReasons why the company did not survive
• Explain the type of disaster, the plan your company had in
place, and why the company did or did not survive.
• Be sure to use your research to support your post.
Your response should be at least 200 words in length. You are
required to use at least your textbook as source material for
your response. All sources used, including the textbook, must
be referenced; paraphrased and quoted material must have
accompanying citations.
Could Someone Be Getting To Our Data?
•Stealing only from weddings of club members
•Knowledge: How to access system and database and SQL
•Access: Passwords on yellow stickies; many copies of key to
server building
•Suspect: Greens keeper guy’s “a techno-whiz,” created report
for Anne, knows SQL and how to access database
What Types of Security Loss Exists? Unauthorized Data
Disclosure
•Pretexting
•Phishing
•Spoofing
–IP spoofing
–Email spoofing
•Drive-by sniffers
•Hacking
•Natural disasters
Incorrect Data Modification
•Procedures not followed or incorrectly designed procedures
•Increasing a customer’s discount or incorrectly modifying
employee’s salary
•Placing incorrect data on company Web site
•Improper internal controls on systems
•System errors
•Faulty recovery actions after a disaster
Faulty Service
•Incorrect data modification
•Systems working incorrectly
•Procedural mistakes
•Programming errors
•IT installation errors
•Usurpation
•Denial of service (unintentional)
•Denial-of-service attacks (intentional)
Loss of Infrastructure Human accidents Theft and terrorist
events Disgruntled or terminated employees Natural disasters
Goal of Information Systems Security
•Threats can be stopped, or at least threat loss reduced
•Safeguards are expensive and reduce work efficiency
•Find trade-off between risk of loss and cost of safeguards
Using MIS InClass 12: Phishing for Credit Cards, Identifying
Numbers, Bank Accounts
•In this exercise, you and a group of your fellow students will
investigate phishing attacks.
•Search the Web for phishing, be aware that your search may
bring the attention of an active phisher.
•Therefore, do not give any data to any site that you visit as
part of this exercise!
What Are the Elements of a Security Policy? Elements of
Security Policy
Managing Risks
•Risk — threats & consequences we know about
•Uncertainty — things we do not know that we do not know
1.General statement of organization’s security program
2.Issue-specific policy
3.System-specific policy
Risk Assessment and Management Risk Assessment
•Tangible consequences.
•Intangible consequences
•Likelihood
•Probable loss
Risk-Management Decisions
•Given probable loss, what to protect?
•Which safeguards inexpensive and easy?
•Which vulnerabilities expensive to eliminate?
•How to balance cost of safeguards with benefits of probable
loss reduction?
Ethics Guide: Security Privacy Legal requirements to protect
customer data
•Gramm-Leach-Bliley (GLB) Act (1999)
•Privacy Act of 1974
•Health Insurance Portability and Accountability Act (HIPAA)
(1996)
•Privacy Principles of the Australian Privacy Act of 1988
Ethics Guide: Security Privacy What requirements does your
university have on data it maintains about you?
•No federal law
•Responsibility to provide public access to graduation records
•Class work, email, exam answers not covered under privacy
law
•Research covered under copyright law, not privacy law
System Access Protocols Kerberos
•Single sign-on for multiple systems
•Authenticates users without sending passwords across network.
•“Tickets” enable users to obtain services from multiple
networks and servers.
•Windows, Linux, Unix employ Kerberos Wireless Access
•VPNs and special security servers
•WEP (Wired-Equivalent Privacy)
•WPA, WPA2 (WiFI Protected Access)
Malware Safeguards
1.Antivirus and antispyware programs
2.Scan frequently
3.Update malware definitions
4.Open email attachments only from known sources
5.Install software updates
6.Browse only reputable Internet neighborhoods
Bots, Botnets, and Bot Herders
•Bot
uncontrolled by user
ery malicious, others annoying
•Botnet
Human Safeguards for Nonemployee Personnel
•Nonemployee personnel
•Contract personnel
urity responsibilities
•Public Users
Account Administration
•Account Management
permissions, removal of unneeded accounts.
•Password Management
frequently
•Help Desk Policies
Security Monitoring Functions
•Activity log analyses
•In-house and external Security testing
Responding to Security Incidents
•Human error & Computer crimes
contact, data to gather, and steps to reduce further loss
•Centralized reporting of all security incidents
•Incident-response plan
•Emergency procedures
Q7: 2022?
•Challenges likely to be iOS and other intelligent portable
devices
•Harder for the lone hacker to find vulnerability to exploit
•Continued investment in safeguards
•Continued problem of electronically porous national borders
Guide: Security Assurance, Hah!
•Employees who never change password or use some simpleton
word like “Sesame” or “MyDogSpot” or something equally
absurd
•Notes with passwords in top drawer of desks
•Management talks about security risk assurance and should
enforce real security
Guide: The Final, Final Word
•Routine work will migrate to lower-labor-cost countries
•Be a symbolic-analytic worker
Case 12: Moore’s Law, One More Time …
•Doubling CPU speed helps criminals
•iOS, Android phones, and millions of mobile devices increase
data communications and exponential opportunities for
computer criminals.

More Related Content

Similar to Question 1 Discuss some human safeguards for employees that can .docx

Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
Don't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint heartedDon't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint heartedIRIS
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Innovators
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarConcept Searching, Inc
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?Precisely
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISSaazan Shrestha
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?Jose L. Quiñones-Borrero
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNorth Texas Chapter of the ISSA
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity nado-web
 

Similar to Question 1 Discuss some human safeguards for employees that can .docx (20)

Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Don't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint heartedDon't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint hearted
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for Nonprofits
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
Security audit
Security auditSecurity audit
Security audit
 
Security Audit
Security AuditSecurity Audit
Security Audit
 
Goans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech LibraryGoans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech Library
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MIS
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 

More from IRESH3

PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docxPreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docxIRESH3
 
Practice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docxPractice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docxIRESH3
 
PrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docxPrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docxIRESH3
 
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docxPowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docxIRESH3
 
PowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docxPowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docxIRESH3
 
preferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docxpreferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docxIRESH3
 
Precedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docxPrecedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docxIRESH3
 
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docxPredictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docxIRESH3
 
Pre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docxPre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docxIRESH3
 
Pre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docxPre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docxIRESH3
 
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docxPre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docxIRESH3
 
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docxPre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docxIRESH3
 
PowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docxPowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docxIRESH3
 
Practice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docxPractice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docxIRESH3
 
PPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docxPPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docxIRESH3
 
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docxPpt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docxIRESH3
 
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docxPrejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docxIRESH3
 
Preparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docxPreparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docxIRESH3
 
PowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docxPowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docxIRESH3
 
PowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docxPowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docxIRESH3
 

More from IRESH3 (20)

PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docxPreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
 
Practice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docxPractice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docx
 
PrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docxPrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docx
 
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docxPowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
 
PowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docxPowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docx
 
preferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docxpreferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docx
 
Precedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docxPrecedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docx
 
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docxPredictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docx
 
Pre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docxPre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docx
 
Pre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docxPre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docx
 
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docxPre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
 
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docxPre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
 
PowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docxPowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docx
 
Practice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docxPractice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docx
 
PPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docxPPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docx
 
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docxPpt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docx
 
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docxPrejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
 
Preparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docxPreparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docx
 
PowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docxPowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docx
 
PowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docxPowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docx
 

Recently uploaded

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 

Recently uploaded (20)

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 

Question 1 Discuss some human safeguards for employees that can .docx

  • 1. Question 1 Discuss some human safeguards for employees that can ensure the security of information systems. Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations. Question 2 How should organizations respond to security threats? Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations. Question 3 Research disaster recovery plans (IS). Be sure to review your lessons and assigned readings. • Assume there are two generic companies, one with and the other without a disaster recovery plan. • Title your response under one of the following headings: oReasons why the company survived oReasons why the company did not survive • Explain the type of disaster, the plan your company had in place, and why the company did or did not survive. • Be sure to use your research to support your post. Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must
  • 2. be referenced; paraphrased and quoted material must have accompanying citations. Could Someone Be Getting To Our Data? •Stealing only from weddings of club members •Knowledge: How to access system and database and SQL •Access: Passwords on yellow stickies; many copies of key to server building •Suspect: Greens keeper guy’s “a techno-whiz,” created report for Anne, knows SQL and how to access database What Types of Security Loss Exists? Unauthorized Data Disclosure •Pretexting •Phishing •Spoofing –IP spoofing –Email spoofing •Drive-by sniffers •Hacking •Natural disasters Incorrect Data Modification •Procedures not followed or incorrectly designed procedures •Increasing a customer’s discount or incorrectly modifying employee’s salary •Placing incorrect data on company Web site •Improper internal controls on systems •System errors •Faulty recovery actions after a disaster Faulty Service •Incorrect data modification •Systems working incorrectly •Procedural mistakes •Programming errors
  • 3. •IT installation errors •Usurpation •Denial of service (unintentional) •Denial-of-service attacks (intentional) Loss of Infrastructure Human accidents Theft and terrorist events Disgruntled or terminated employees Natural disasters Goal of Information Systems Security •Threats can be stopped, or at least threat loss reduced •Safeguards are expensive and reduce work efficiency •Find trade-off between risk of loss and cost of safeguards Using MIS InClass 12: Phishing for Credit Cards, Identifying Numbers, Bank Accounts •In this exercise, you and a group of your fellow students will investigate phishing attacks. •Search the Web for phishing, be aware that your search may bring the attention of an active phisher. •Therefore, do not give any data to any site that you visit as part of this exercise! What Are the Elements of a Security Policy? Elements of Security Policy Managing Risks •Risk — threats & consequences we know about •Uncertainty — things we do not know that we do not know 1.General statement of organization’s security program 2.Issue-specific policy 3.System-specific policy Risk Assessment and Management Risk Assessment •Tangible consequences. •Intangible consequences
  • 4. •Likelihood •Probable loss Risk-Management Decisions •Given probable loss, what to protect? •Which safeguards inexpensive and easy? •Which vulnerabilities expensive to eliminate? •How to balance cost of safeguards with benefits of probable loss reduction? Ethics Guide: Security Privacy Legal requirements to protect customer data •Gramm-Leach-Bliley (GLB) Act (1999) •Privacy Act of 1974 •Health Insurance Portability and Accountability Act (HIPAA) (1996) •Privacy Principles of the Australian Privacy Act of 1988 Ethics Guide: Security Privacy What requirements does your university have on data it maintains about you? •No federal law •Responsibility to provide public access to graduation records •Class work, email, exam answers not covered under privacy law •Research covered under copyright law, not privacy law System Access Protocols Kerberos •Single sign-on for multiple systems •Authenticates users without sending passwords across network. •“Tickets” enable users to obtain services from multiple networks and servers. •Windows, Linux, Unix employ Kerberos Wireless Access •VPNs and special security servers •WEP (Wired-Equivalent Privacy)
  • 5. •WPA, WPA2 (WiFI Protected Access) Malware Safeguards 1.Antivirus and antispyware programs 2.Scan frequently 3.Update malware definitions 4.Open email attachments only from known sources 5.Install software updates 6.Browse only reputable Internet neighborhoods Bots, Botnets, and Bot Herders •Bot uncontrolled by user ery malicious, others annoying •Botnet Human Safeguards for Nonemployee Personnel •Nonemployee personnel •Contract personnel urity responsibilities •Public Users Account Administration •Account Management permissions, removal of unneeded accounts. •Password Management frequently •Help Desk Policies
  • 6. Security Monitoring Functions •Activity log analyses •In-house and external Security testing Responding to Security Incidents •Human error & Computer crimes contact, data to gather, and steps to reduce further loss •Centralized reporting of all security incidents •Incident-response plan •Emergency procedures Q7: 2022? •Challenges likely to be iOS and other intelligent portable devices •Harder for the lone hacker to find vulnerability to exploit •Continued investment in safeguards •Continued problem of electronically porous national borders Guide: Security Assurance, Hah! •Employees who never change password or use some simpleton word like “Sesame” or “MyDogSpot” or something equally absurd •Notes with passwords in top drawer of desks •Management talks about security risk assurance and should enforce real security Guide: The Final, Final Word •Routine work will migrate to lower-labor-cost countries •Be a symbolic-analytic worker
  • 7. Case 12: Moore’s Law, One More Time … •Doubling CPU speed helps criminals •iOS, Android phones, and millions of mobile devices increase data communications and exponential opportunities for computer criminals.