Securing Information Systems discusses system vulnerability and abuse, contemporary security challenges, and technologies for protecting information resources. It defines security as policies, procedures, and technical measures to prevent unauthorized access. Controls ensure safety of assets, accuracy of records, and adherence to standards. Vulnerability is a system flaw intersecting with access and exploit capability. Systems are vulnerable due to accessibility, hardware/software problems, use outside an organization's control, and loss/theft of devices. Computer crime uses or targets computers/networks. Types include spoofing, sniffing, scams, denial of service attacks, war dialing, logic bombs, buffer overflows, password cracking, identity theft, and click fraud. Technologies like firewalls, intrusion