New User Special Price Expires in

Let's log you in.

Sign in with Facebook


Don't have a StudySoup account? Create one here!


Create a StudySoup account

Be part of our community, it's free to join!

Sign up with Facebook


Create your account
By creating an account you agree to StudySoup's terms and conditions and privacy policy

Already have a StudySoup account? Login here


by: Miss Olaf Jaskolski
Miss Olaf Jaskolski
GPA 3.66


Almost Ready


These notes were just uploaded, and will be ready to view shortly.

Purchase these notes here, or revisit this page.

Either way, we'll remind you when they're ready :)

Preview These Notes for FREE

Get a free preview of these Notes, just enter your email below.

Unlock Preview
Unlock Preview

Preview these materials now for free

Why put in your email? Get access to more of this material and other relevant free materials for your school

View Preview

About this Document

Class Notes
25 ?




Popular in Course

Popular in Science

This 7 page Class Notes was uploaded by Miss Olaf Jaskolski on Sunday October 11, 2015. The Class Notes belongs to IS215 at Eastern Michigan University taught by FaisonGibson in Fall. Since its upload, it has received 10 views. For similar materials see /class/221477/is215-eastern-michigan-university in Science at Eastern Michigan University.


Reviews for End


Report this Material


What is Karma?


Karma is the currency of StudySoup.

You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!

Date Created: 10/11/15
Information Security Laying the groundwork for discussion SPIM Ethics security amp privacy all in one 0 What is SPIM 0 How is it different from SPAM 0 Who is most likely to receive SPIM 0 How can you defend against it 0 What are the costs of SPIM SPIM Weak points and solutions 0 What were the threats exploited 0 What are possible defenses Intemm m Ihe Outside horn Ihe Inside EMPLOYEES HAHDWAHE THREATS ume w mm M w M V my nyrh w u 1 Juan General and Application Controls for Protecting Information Systems 39lype of Genital General Controls Description ol Pti rpose Physical controls Access controls Data security controls Administrative controls Communications network controls Border secur39ty Firewalls Virus controls intrusion detection Virtual private networking Authentication Authorization Application Controls Input controls Processing controls Output controls Physical protection of computer laCiIities and resources Restriction of unauthorized user access to cornputer resources concerned with user identificatlon Protecting data from accidental or intentional dISC osure to unauthorized pe ns or from unauthorized modi cation or destruction issuing and monitoring security guidelines Major obiective is access control accessrcontrol policy works Antiwrus software see www trendrnicrotom wwwcert g pgpcorn www5yrnanteccom lee corn and wwwrsasecuritycorn wwwmca WWWJSSJTET Major obiective is to detect unauthorized access 0 networ l Uses the lnternet to carry information WIil39ilri a compan and among business partners but with increased security by use of encryption authentication and access control Major obiective is prool of identity Permission issued to indiViduals and groups to do certain actiVities with information resources based on verified identity Prevent data alteration Or loss Ensure that data are complete valid and accurate when being processed and that programs have properly executed Ensure that the results of computer processing are accurate valid complete and consistent The Difficulties in Protecting Information Resources u Hundreds of potential threats exist a Computing resources may be situated in many locations n Many Indlvlduals control information esse s a Computer networks can be outside the organization and difficult to protect a Rapid technological Changes make some controls obsolete as soon as they are installed a Many computer crimes are undetected tor a long period oi time so it is ditticuit to learn from experience a People tend to via ate security procedures because the procedures are inconyenient r c r r r c r u n x c The amount or computer knowledge necessary to commit computer crimes is usually minimal As a matter oflact one can learn hacking forfree on the lnternet The cost of preventing nazerds can be very nigh Tneretore most organizations slmply cannot afford to protect against all possible hazards u it is difficult to conduct a costebenefitJustification for controls before an attack occurs cause it IS difficult to assess the value ofa hypothetical attack a Summary 0 Security is about risk 0 Risk 0 Accept 0 Limit 0 Transfer


Buy Material

Are you sure you want to buy this material for

25 Karma

Buy Material

BOOM! Enjoy Your Free Notes!

We've added these Notes to your profile, click here to view them now.


You're already Subscribed!

Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'

Why people love StudySoup

Bentley McCaw University of Florida

"I was shooting for a perfect 4.0 GPA this semester. Having StudySoup as a study aid was critical to helping me achieve my goal...and I nailed it!"

Amaris Trozzo George Washington University

"I made $350 in just two days after posting my first study guide."

Steve Martinelli UC Los Angeles

"There's no way I would have passed my Organic Chemistry class this semester without the notes and study guides I got from StudySoup."

Parker Thompson 500 Startups

"It's a great way for students to improve their educational experience and it seemed like a product that everybody wants, so all the people participating are winning."

Become an Elite Notetaker and start selling your notes online!

Refund Policy


All subscriptions to StudySoup are paid in full at the time of subscribing. To change your credit card information or to cancel your subscription, go to "Edit Settings". All credit card information will be available there. If you should decide to cancel your subscription, it will continue to be valid until the next payment period, as all payments for the current period were made in advance. For special circumstances, please email


StudySoup has more than 1 million course-specific study resources to help students study smarter. If you’re having trouble finding what you’re looking for, our customer support team can help you find what you need! Feel free to contact them here:

Recurring Subscriptions: If you have canceled your recurring subscription on the day of renewal and have not downloaded any documents, you may request a refund by submitting an email to

Satisfaction Guarantee: If you’re not satisfied with your subscription, you can contact us for further help. Contact must be made within 3 business days of your subscription purchase and your refund request will be subject for review.

Please Note: Refunds can never be provided more than 30 days after the initial purchase date regardless of your activity on the site.