UNF CIS 4328 - Ethical and Social Implications (32 pages)

Previewing pages 1, 2, 15, 16, 31, 32 of 32 page document View the full content.
View Full Document

Ethical and Social Implications



Previewing pages 1, 2, 15, 16, 31, 32 of actual document.

View the full content.
View Full Document
View Full Document

Ethical and Social Implications

12 views


Pages:
32
School:
University of North Florida
Course:
Cis 4328 - Information Systems Senior Project II
Information Systems Senior Project II Documents

Unformatted text preview:

Ethical Social Implications Information Security Overview The security environment in which the information systems will operate includes assets threats and security measures There are four basic categories of corporate assets physical intellectual software personnel transactions and services What is Security Authentication Is someone who he or she says he or she is Is some object such as a program what it says it is Does a message come from where it says it comes from Can someone deny something he or she did nonrepudiation What is Security Authorization What is a specific person or group of people allowed to do What is a specific program allowed to do What is Security Encryption Who is allowed to see what information What is Security System Protection Virus protection Firewalls and proxies DOS Minimize accidental failures Industry with most threats Database software developers in the banking and finance industries reported more security breaches than database developers in any other industry polled in a recent survey Most vulnerable industries 27 percent of the developers surveyed in the banking and financial services industries said they had experienced a security breach in the past year 18 percent in the medical and health care industry and telecommunications database developers said they had experienced a security breach 12 in electronic commerce and other internet companies experienced breaches 9 in the government and military sector Top Vulnerabilities That Affect All Systems Default installs of operating systems and applications Accounts with No Passwords or Weak Passwords Non existent or Incomplete Backups Large number of open ports Not filtering packets for correct incoming and outgoing addresses Non existent or incomplete logging Types of security breaches Security breaches are classified under three general definitions a computer virus a human error or an unauthorized break in Types of Security Breaches Theft of assets Improper use of assets Use of assets



View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Ethical and Social Implications and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Ethical and Social Implications and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?