Page 323 -
P. 323
Chapter 8
Securing Information Systems
LEARNING OBJECTIVES CHAPTER OUTLINE
After reading this chapter, you 8.1 SYSTEM VULNERABILITY AND ABUSE
will be able to answer the Why Systems Are Vulnerable
following questions: Malicious Software: Viruses, Worms, Trojan Horses,
and Spyware
1. Why are information systems Hackers and Computer Crime
vulnerable to destruction, error, Internal Threats: Employees
and abuse? Software Vulnerability
2. What is the business value of 8.2 BUSINESS VALUE OF SECURITY AND CONTROL
security and control? Legal and Regulatory Requirements for Electronic
Records Management
3. What are the components of an Electronic Evidence and Computer Forensics
organizational framework for
8.3 ESTABLISHING A FRAMEWORK FOR SECURITY
security and control?
AND CONTROL
4. What are the most important tools Information Systems Controls
and technologies for safeguarding Risk Assessment
information resources? Security Policy
Disaster Recovery Planning and Business Continuity
Planning
The Role of Auditing
8.4 TECHNOLOGIES AND TOOLS FOR PROTECTING
INFORMATION RESOURCES
Identity Management and Authentication
Firewalls, Intrusion Detection Systems, and Antivirus
Software
Securing Wireless Networks
Encryption and Public Key Infrastructure
Ensuring System Availability
Security Issues for Cloud Computing and the Mobile
Digital Platform
Ensuring Software Quality
LEARNING TRACK MODULES
The Booming Job Market in IT Security
The Sarbanes-Oxley Act
Computer Forensics
Interactive Sessions: General and Application Controls for Information
Stuxnet and the Changing Systems
Face of Cyberwarfare Management Challenges of Security and Control
Software Vulnerability and Reliability
MWEB Business: Hacked
MIS_13_Ch_08 Global.indd 322 1/17/2013 3:10:18 PM