Page 323 -
P. 323

Chapter 8





               Securing Information Systems






                   LEARNING OBJECTIVES                     CHAPTER OUTLINE

                 After reading this chapter, you       8.1   SYSTEM VULNERABILITY AND ABUSE
               will be able to answer the                   Why Systems Are Vulnerable
               following questions:                         Malicious Software: Viruses, Worms, Trojan Horses,
                                                              and Spyware
                     1.  Why are information systems        Hackers and Computer Crime
                     vulnerable to destruction, error,      Internal Threats: Employees
                   and abuse?                               Software Vulnerability
                     2.  What is the business value of   8.2   BUSINESS VALUE OF SECURITY AND CONTROL
                     security and control?                  Legal and Regulatory Requirements for Electronic
                                                              Records Management
                     3.  What are the components of an      Electronic Evidence and Computer Forensics
                     organizational framework for
                                                       8.3   ESTABLISHING A FRAMEWORK FOR SECURITY
                     security and control?
                                                            AND CONTROL
                     4.  What are the most important tools   Information Systems Controls
                   and technologies for safeguarding        Risk Assessment
                   information resources?                   Security Policy
                                                            Disaster Recovery Planning and Business Continuity
                                                              Planning
                                                            The Role of Auditing
                                                       8.4   TECHNOLOGIES AND TOOLS FOR PROTECTING
                                                            INFORMATION RESOURCES
                                                            Identity Management and Authentication
                                                            Firewalls, Intrusion Detection Systems, and Antivirus
                                                              Software
                                                            Securing Wireless Networks
                                                            Encryption and Public Key Infrastructure
                                                            Ensuring System Availability
                                                            Security Issues for Cloud Computing and the Mobile
                                                              Digital Platform
                                                            Ensuring Software Quality
                                                       LEARNING TRACK MODULES
                                                            The Booming Job Market in IT Security
                                                            The Sarbanes-Oxley Act
                                                            Computer Forensics
                  Interactive Sessions:                     General and Application Controls for Information

                  Stuxnet and the Changing                    Systems
                      Face of Cyberwarfare                  Management Challenges of Security and Control
                                                            Software Vulnerability and Reliability
                  MWEB Business: Hacked










   MIS_13_Ch_08 Global.indd   322                                                                             1/17/2013   3:10:18 PM
   318   319   320   321   322   323   324   325   326   327   328