- what is the goal of information security?
- what are the sources of threats?
- unauthorized data disclosure
- what types of security loss exists
- unauthorized data disclosure
- pretexting
- phishing
- spoofing
- IP spoofing
- Email Spoofing
- Drive by sniffer
- hacking
- natural disasters
- how big is the computer security problem
- ponemon 2012 studies summary
- median cost of computer crime increasing
- malicious insiders increasingly serious security threat
- data loss
- how should you respond to security threats
- take security seriously
- create strong passwords
- use multiple passwords
- send no valuable data via email or IM
- use https at trusted, reputable vendors
- remove high-value assets from computers
- clear browsing history, temporary files, and cookies
- regularly update antivirus software
- demonstrate security concern to your fellow workers
- follow organizational security directives and guidlines
- how can organizations respond to threats
- technical safeguards
- data safeguards
- human safeguards
- how should organizations respond to security incidents
- have a plan in place
- centralized reporting
- specific responses
- speed
- preparation pays
- dont make problem worse
- practice
Cloud Computer - The Elastic leasing of pooled computer resources over the internet Elastic because it can flex Computer resources cause you Pooled -Virtualization Virtualization - process by which one computer hosts the appearance of many computers. Operates as if installed on one’s own computer Leasing - don’t own the program, you own a license/right to use the program Over the internet SaaS Software as a service, you don’t install these yet they’re considered software PaaS (platform as a service; for big project managers and creators/developer IaaS Infrastructure as a service, Most commonly used Virtual Private Network(VPN) Lots of question on it How do Organizations use Cloud Services Securely? VPN client software that encodes messages Click on the software, input the key, then it creates a tunnel. Whenever you need to send something, that VPN encrypts your message, making readable data unreadable. Once it ge...
Comments
Post a Comment