SlideShare a Scribd company logo
Question 1
Discuss some human safeguards for employees that can ensure
the security of information systems.
Your response should be at least 200 words in length. You are
required to use at least your textbook as source material for
your response. All sources used, including the textbook, must
be referenced; paraphrased and quoted material must have
accompanying citations.
Question 2
How should organizations respond to security threats?
Your response should be at least 200 words in length. You are
required to use at least your textbook as source material for
your response. All sources used, including the textbook, must
be referenced; paraphrased and quoted material must have
accompanying citations.
Question 3
Research disaster recovery plans (IS). Be sure to review your
lessons and assigned readings.
• Assume there are two generic companies, one with and the
other without a disaster recovery plan.
• Title your response under one of the following headings:
oReasons why the company survived
oReasons why the company did not survive
• Explain the type of disaster, the plan your company had in
place, and why the company did or did not survive.
• Be sure to use your research to support your post.
Your response should be at least 200 words in length. You are
required to use at least your textbook as source material for
your response. All sources used, including the textbook, must
be referenced; paraphrased and quoted material must have
accompanying citations.
Could Someone Be Getting To Our Data?
•Stealing only from weddings of club members
•Knowledge: How to access system and database and SQL
•Access: Passwords on yellow stickies; many copies of key to
server building
•Suspect: Greens keeper guy’s “a techno-whiz,” created report
for Anne, knows SQL and how to access database
What Types of Security Loss Exists? Unauthorized Data
Disclosure
•Pretexting
•Phishing
•Spoofing
–IP spoofing
–Email spoofing
•Drive-by sniffers
•Hacking
•Natural disasters
Incorrect Data Modification
•Procedures not followed or incorrectly designed procedures
•Increasing a customer’s discount or incorrectly modifying
employee’s salary
•Placing incorrect data on company Web site
•Improper internal controls on systems
•System errors
•Faulty recovery actions after a disaster
Faulty Service
•Incorrect data modification
•Systems working incorrectly
•Procedural mistakes
•Programming errors
•IT installation errors
•Usurpation
•Denial of service (unintentional)
•Denial-of-service attacks (intentional)
Loss of Infrastructure Human accidents Theft and terrorist
events Disgruntled or terminated employees Natural disasters
Goal of Information Systems Security
•Threats can be stopped, or at least threat loss reduced
•Safeguards are expensive and reduce work efficiency
•Find trade-off between risk of loss and cost of safeguards
Using MIS InClass 12: Phishing for Credit Cards, Identifying
Numbers, Bank Accounts
•In this exercise, you and a group of your fellow students will
investigate phishing attacks.
•Search the Web for phishing, be aware that your search may
bring the attention of an active phisher.
•Therefore, do not give any data to any site that you visit as
part of this exercise!
What Are the Elements of a Security Policy? Elements of
Security Policy
Managing Risks
•Risk — threats & consequences we know about
•Uncertainty — things we do not know that we do not know
1.General statement of organization’s security program
2.Issue-specific policy
3.System-specific policy
Risk Assessment and Management Risk Assessment
•Tangible consequences.
•Intangible consequences
•Likelihood
•Probable loss
Risk-Management Decisions
•Given probable loss, what to protect?
•Which safeguards inexpensive and easy?
•Which vulnerabilities expensive to eliminate?
•How to balance cost of safeguards with benefits of probable
loss reduction?
Ethics Guide: Security Privacy Legal requirements to protect
customer data
•Gramm-Leach-Bliley (GLB) Act (1999)
•Privacy Act of 1974
•Health Insurance Portability and Accountability Act (HIPAA)
(1996)
•Privacy Principles of the Australian Privacy Act of 1988
Ethics Guide: Security Privacy What requirements does your
university have on data it maintains about you?
•No federal law
•Responsibility to provide public access to graduation records
•Class work, email, exam answers not covered under privacy
law
•Research covered under copyright law, not privacy law
System Access Protocols Kerberos
•Single sign-on for multiple systems
•Authenticates users without sending passwords across network.
•“Tickets” enable users to obtain services from multiple
networks and servers.
•Windows, Linux, Unix employ Kerberos Wireless Access
•VPNs and special security servers
•WEP (Wired-Equivalent Privacy)
•WPA, WPA2 (WiFI Protected Access)
Malware Safeguards
1.Antivirus and antispyware programs
2.Scan frequently
3.Update malware definitions
4.Open email attachments only from known sources
5.Install software updates
6.Browse only reputable Internet neighborhoods
Bots, Botnets, and Bot Herders
•Bot
uncontrolled by user
ery malicious, others annoying
•Botnet
Human Safeguards for Nonemployee Personnel
•Nonemployee personnel
•Contract personnel
urity responsibilities
•Public Users
Account Administration
•Account Management
permissions, removal of unneeded accounts.
•Password Management
frequently
•Help Desk Policies
Security Monitoring Functions
•Activity log analyses
•In-house and external Security testing
Responding to Security Incidents
•Human error & Computer crimes
contact, data to gather, and steps to reduce further loss
•Centralized reporting of all security incidents
•Incident-response plan
•Emergency procedures
Q7: 2022?
•Challenges likely to be iOS and other intelligent portable
devices
•Harder for the lone hacker to find vulnerability to exploit
•Continued investment in safeguards
•Continued problem of electronically porous national borders
Guide: Security Assurance, Hah!
•Employees who never change password or use some simpleton
word like “Sesame” or “MyDogSpot” or something equally
absurd
•Notes with passwords in top drawer of desks
•Management talks about security risk assurance and should
enforce real security
Guide: The Final, Final Word
•Routine work will migrate to lower-labor-cost countries
•Be a symbolic-analytic worker
Case 12: Moore’s Law, One More Time …
•Doubling CPU speed helps criminals
•iOS, Android phones, and millions of mobile devices increase
data communications and exponential opportunities for
computer criminals.

More Related Content

Similar to Question 1 Discuss some human safeguards for employees that can .docx

Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
TechSoup
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
Community IT Innovators
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
Cognic Systems Pvt Ltd
 
Don't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint heartedDon't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint hearted
IRIS
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for Nonprofits
Community IT Innovators
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
Concept Searching, Inc
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
Nicholas Davis
 
Security audit
Security auditSecurity audit
Security audit
Nicholas Davis
 
Security Audit
Security AuditSecurity Audit
Security Audit
Nicholas Davis
 
Goans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech LibraryGoans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech Library
National Information Standards Organization (NISO)
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
Precisely
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
ssuser50c54b
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
Nicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
Nicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
Nicholas Davis
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MIS
Saazan Shrestha
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
Jose L. Quiñones-Borrero
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
North Texas Chapter of the ISSA
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
nado-web
 

Similar to Question 1 Discuss some human safeguards for employees that can .docx (20)

Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Don't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint heartedDon't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint hearted
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for Nonprofits
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
Security audit
Security auditSecurity audit
Security audit
 
Security Audit
Security AuditSecurity Audit
Security Audit
 
Goans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech LibraryGoans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech Library
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MIS
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 

More from IRESH3

PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docxPreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
IRESH3
 
Practice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docxPractice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docx
IRESH3
 
PrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docxPrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docx
IRESH3
 
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docxPowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
IRESH3
 
PowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docxPowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docx
IRESH3
 
preferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docxpreferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docx
IRESH3
 
Precedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docxPrecedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docx
IRESH3
 
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docxPredictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docx
IRESH3
 
Pre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docxPre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docx
IRESH3
 
Pre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docxPre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docx
IRESH3
 
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docxPre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
IRESH3
 
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docxPre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
IRESH3
 
PowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docxPowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docx
IRESH3
 
Practice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docxPractice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docx
IRESH3
 
PPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docxPPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docx
IRESH3
 
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docxPpt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docx
IRESH3
 
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docxPrejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
IRESH3
 
Preparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docxPreparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docx
IRESH3
 
PowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docxPowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docx
IRESH3
 
PowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docxPowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docx
IRESH3
 

More from IRESH3 (20)

PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docxPreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
 
Practice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docxPractice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docx
 
PrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docxPrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docx
 
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docxPowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
 
PowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docxPowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docx
 
preferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docxpreferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docx
 
Precedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docxPrecedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docx
 
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docxPredictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docx
 
Pre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docxPre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docx
 
Pre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docxPre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docx
 
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docxPre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
 
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docxPre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
 
PowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docxPowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docx
 
Practice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docxPractice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docx
 
PPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docxPPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docx
 
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docxPpt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docx
 
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docxPrejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
 
Preparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docxPreparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docx
 
PowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docxPowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docx
 
PowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docxPowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docx
 

Recently uploaded

BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 

Recently uploaded (20)

BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 

Question 1 Discuss some human safeguards for employees that can .docx

  • 1. Question 1 Discuss some human safeguards for employees that can ensure the security of information systems. Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations. Question 2 How should organizations respond to security threats? Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations. Question 3 Research disaster recovery plans (IS). Be sure to review your lessons and assigned readings. • Assume there are two generic companies, one with and the other without a disaster recovery plan. • Title your response under one of the following headings: oReasons why the company survived oReasons why the company did not survive • Explain the type of disaster, the plan your company had in place, and why the company did or did not survive. • Be sure to use your research to support your post. Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must
  • 2. be referenced; paraphrased and quoted material must have accompanying citations. Could Someone Be Getting To Our Data? •Stealing only from weddings of club members •Knowledge: How to access system and database and SQL •Access: Passwords on yellow stickies; many copies of key to server building •Suspect: Greens keeper guy’s “a techno-whiz,” created report for Anne, knows SQL and how to access database What Types of Security Loss Exists? Unauthorized Data Disclosure •Pretexting •Phishing •Spoofing –IP spoofing –Email spoofing •Drive-by sniffers •Hacking •Natural disasters Incorrect Data Modification •Procedures not followed or incorrectly designed procedures •Increasing a customer’s discount or incorrectly modifying employee’s salary •Placing incorrect data on company Web site •Improper internal controls on systems •System errors •Faulty recovery actions after a disaster Faulty Service •Incorrect data modification •Systems working incorrectly •Procedural mistakes •Programming errors
  • 3. •IT installation errors •Usurpation •Denial of service (unintentional) •Denial-of-service attacks (intentional) Loss of Infrastructure Human accidents Theft and terrorist events Disgruntled or terminated employees Natural disasters Goal of Information Systems Security •Threats can be stopped, or at least threat loss reduced •Safeguards are expensive and reduce work efficiency •Find trade-off between risk of loss and cost of safeguards Using MIS InClass 12: Phishing for Credit Cards, Identifying Numbers, Bank Accounts •In this exercise, you and a group of your fellow students will investigate phishing attacks. •Search the Web for phishing, be aware that your search may bring the attention of an active phisher. •Therefore, do not give any data to any site that you visit as part of this exercise! What Are the Elements of a Security Policy? Elements of Security Policy Managing Risks •Risk — threats & consequences we know about •Uncertainty — things we do not know that we do not know 1.General statement of organization’s security program 2.Issue-specific policy 3.System-specific policy Risk Assessment and Management Risk Assessment •Tangible consequences. •Intangible consequences
  • 4. •Likelihood •Probable loss Risk-Management Decisions •Given probable loss, what to protect? •Which safeguards inexpensive and easy? •Which vulnerabilities expensive to eliminate? •How to balance cost of safeguards with benefits of probable loss reduction? Ethics Guide: Security Privacy Legal requirements to protect customer data •Gramm-Leach-Bliley (GLB) Act (1999) •Privacy Act of 1974 •Health Insurance Portability and Accountability Act (HIPAA) (1996) •Privacy Principles of the Australian Privacy Act of 1988 Ethics Guide: Security Privacy What requirements does your university have on data it maintains about you? •No federal law •Responsibility to provide public access to graduation records •Class work, email, exam answers not covered under privacy law •Research covered under copyright law, not privacy law System Access Protocols Kerberos •Single sign-on for multiple systems •Authenticates users without sending passwords across network. •“Tickets” enable users to obtain services from multiple networks and servers. •Windows, Linux, Unix employ Kerberos Wireless Access •VPNs and special security servers •WEP (Wired-Equivalent Privacy)
  • 5. •WPA, WPA2 (WiFI Protected Access) Malware Safeguards 1.Antivirus and antispyware programs 2.Scan frequently 3.Update malware definitions 4.Open email attachments only from known sources 5.Install software updates 6.Browse only reputable Internet neighborhoods Bots, Botnets, and Bot Herders •Bot uncontrolled by user ery malicious, others annoying •Botnet Human Safeguards for Nonemployee Personnel •Nonemployee personnel •Contract personnel urity responsibilities •Public Users Account Administration •Account Management permissions, removal of unneeded accounts. •Password Management frequently •Help Desk Policies
  • 6. Security Monitoring Functions •Activity log analyses •In-house and external Security testing Responding to Security Incidents •Human error & Computer crimes contact, data to gather, and steps to reduce further loss •Centralized reporting of all security incidents •Incident-response plan •Emergency procedures Q7: 2022? •Challenges likely to be iOS and other intelligent portable devices •Harder for the lone hacker to find vulnerability to exploit •Continued investment in safeguards •Continued problem of electronically porous national borders Guide: Security Assurance, Hah! •Employees who never change password or use some simpleton word like “Sesame” or “MyDogSpot” or something equally absurd •Notes with passwords in top drawer of desks •Management talks about security risk assurance and should enforce real security Guide: The Final, Final Word •Routine work will migrate to lower-labor-cost countries •Be a symbolic-analytic worker
  • 7. Case 12: Moore’s Law, One More Time … •Doubling CPU speed helps criminals •iOS, Android phones, and millions of mobile devices increase data communications and exponential opportunities for computer criminals.