• what is the goal of information security? 
  • what are the sources of threats? 
    • unauthorized data disclosure 
  • what types of security loss exists 
    • unauthorized data disclosure 
    • pretexting 
    • phishing 
    • spoofing 
      • IP spoofing 
      • Email Spoofing 
    • Drive by sniffer 
    • hacking 
    • natural disasters 
  • how big is the computer security problem 
  • ponemon 2012 studies summary 
    • median cost of computer crime increasing 
    • malicious insiders increasingly serious security threat 
    • data loss 
  • how should you respond to security threats 
    • take security seriously 
    • create strong passwords 
    • use multiple passwords 
    • send no valuable data via email or IM 
    • use https at trusted, reputable vendors 
    • remove high-value assets from computers 
    • clear browsing history, temporary files, and cookies 
    • regularly update antivirus software 
    • demonstrate security concern to your fellow workers 
    • follow organizational security directives and guidlines 
  • how can organizations respond to threats 
    • technical safeguards
    • data safeguards 
    • human safeguards 
  • how should organizations respond to security incidents 
    • have a plan in place 
    • centralized reporting 
    • specific responses
      • speed 
      • preparation pays 
      • dont make problem worse 
      • practice 
      •   

Comments

Popular posts from this blog

database