Академический Документы
Профессиональный Документы
Культура Документы
ocmis.blogspot.com
Can you imagine what would happen if you tried to link to the
Internet without a firewall or antivirus software? Your computer
would be disabled in a few seconds, and it might take you many
days to recover.
When large amounts of data are stored in electronic form, they are
vulnerable to many more kinds of threats than when they existed in
manual form. Through communications networks, information
systems in different locations are interconnected. The potential for
unauthorized access, abuse, or fraud is not limited to a single
location but can occur at any access point in the network.
1 of 9 4/14/2019, 4:41 PM
Securing Information Systems about:reader?url=http://ocmis.blogspot.com/2013/03/securing-informatio...
2 of 9 4/14/2019, 4:41 PM
Securing Information Systems about:reader?url=http://ocmis.blogspot.com/2013/03/securing-informatio...
privacy.
Denial-of-service Attacks
3 of 9 4/14/2019, 4:41 PM
Securing Information Systems about:reader?url=http://ocmis.blogspot.com/2013/03/securing-informatio...
Computer Crime
Identity Theft
Identity Theft is a crime in which an imposter obtains key pieces of
personal information, such as social security identification numbers,
driver's license numbers, or credit card numbers, to impersonate
someone else.
Click Fraud
Click Fraud occurs when an individual or computer program
fraudulently clicks on an online ad without any intention of learning
more about the advertiser or making a purchase.
4 of 9 4/14/2019, 4:41 PM
Securing Information Systems about:reader?url=http://ocmis.blogspot.com/2013/03/securing-informatio...
5 of 9 4/14/2019, 4:41 PM
Securing Information Systems about:reader?url=http://ocmis.blogspot.com/2013/03/securing-informatio...
Role of Auditing
An MIS audit examines the firm's overall security environment as
well as controls governing individual information systems.
Firewalls
Firewalls prevent unauthorized users from accessing private
networks. A firewall is a combination of hardware and software that
controls the flow of incoming and outgoing network traffic.
6 of 9 4/14/2019, 4:41 PM
Securing Information Systems about:reader?url=http://ocmis.blogspot.com/2013/03/securing-informatio...
Two methods for encrypting network traffic on the Web are SSL and
S-HTTP. Secure Sockets Layer (SSL) and its successor Transport
Layer Security (TLS) enable client and server computers to
manage encryption and decryption activities as they communicate
with each other during a secure Web session. Secure Hypertext
Transfer Protocol (S-HTTP) is another protocol used for encrypting
data flowing over the Internet, but it is limited to individual
messages, where as SSL and TLS are designed to establish a
secure connection between two computers. A more secure form of
encryption called public key encryption uses two keys: one share
(or public) and one totally private. The keys are mathematically
related so that data encrypted with one key can be decrypted using
only the other key.
7 of 9 4/14/2019, 4:41 PM
Securing Information Systems about:reader?url=http://ocmis.blogspot.com/2013/03/securing-informatio...
8 of 9 4/14/2019, 4:41 PM
Securing Information Systems about:reader?url=http://ocmis.blogspot.com/2013/03/securing-informatio...
Summary
9 of 9 4/14/2019, 4:41 PM