HOME / ¹®¼°øÀ¯ / ¸®Æ÷Æ®/³í¹® / ±â¼ú°øÇÐ
0
0°ÇÀÇ Èı⺸±â(¿µ¹®) Securing information systems¿¡ ´ëÇØ ±â¼úÇÑ ¸®Æ÷Æ® Âü°íÀÚ·áÀÔ´Ï´Ù.
copyright 2014 pearson education
management information systems, global edition
±â¾÷°úÁ¤º¸ (management information systems) securing information systems learning objectives security challenge malwares, hacking, computer crimes framework for security and control security policy ensuring business continuity the role of security audit technology
access control, firewalls, intrusion detection systems, antivirus software, internet encryption, public key encryption, digital signature, digital certificate
221 copyright 2014 pearson education
management information systems, global edition
±â¾÷°úÁ¤º¸ (management information systems) securing information systems ¡°miniduke¡± exposes eu cybersecurity gaps
problem: massive data breach; new sandbox-evading techniques
solution: initiative to implement a common cybersecurity strategy.
demonstrates the lack of a centralized approach to cybersecurity that leaves nations vulnerable to national security breaches
222 copyright 2014 pearson education
management information systems, global edition
±â¾÷°úÁ¤º¸ (management information systems) securing information systems system vulnerability and abuse security:
policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems
controls:
methods, policies, and organizational procedures that ensure safety of organization¡¯s assets; accuracy and reliability of its accounting records; and operational adherence to management standards
223 copyright 2014 pearson education
management information systems, global edition
±â¾÷°úÁ¤º¸ (management information systems) securing information systems system vulnerability and abuse why systems are vulnerable
accessibility of networks (unauthorized access, abuse, fraud)
hardware problems (breakdowns, configuration errors, damage from improper use or crime)
software problems (programming errors, installation errors, unauthorized changes)
disasters
use of networks/computers outside of firm¡¯s control
loss and theft of portable devices 224 copyright 2014 pearson education ±â¾÷°úÁ¤º¸ (management information systems) figure xxx-xxx securing information systems
contemporary security challenges and vulnerabilities
225 copyright 2014 pearson education
management information systems, global edition
±â¾÷°úÁ¤º¸ (management information systems) securing information systems system vulnerability and abuse internet vulnerabilities open to anyone wide impact unencrypted voip e-mail, p2p, im wifi connection
wi-fi networks easily intruded using sniffer programs (ÀÌÇÏ »ý·«)
¹ÞÀº º°Á¡
0/5
0°³ÀÇ º°Á¡
¹®¼°øÀ¯ ÀڷḦ µî·ÏÇØ ÁÖ¼¼¿ä.
¹®¼°øÀ¯ Æ÷ÀÎÆ®¿Í Çö±ÝÀ» µå¸³´Ï´Ù.
Æ÷ÀÎÆ® : ÀÚ·á 1°Ç´ç ÃÖ´ë 5,000P Áö±Þ
Çö±Ý : ÀÚ·á 1°Ç´ç ÃÖ´ë 2,000¿ø Áö±Þ