MANAGEMENT INFO SYSTEMS
MANAGEMENT INFO SYSTEMS IS 301
Popular in Course
Popular in Management Information Systems
This 5 page Class Notes was uploaded by Boyd Luettgen on Sunday October 25, 2015. The Class Notes belongs to IS 301 at University of Nevada - Las Vegas taught by Staff in Fall. Since its upload, it has received 29 views. For similar materials see /class/228633/is-301-university-of-nevada-las-vegas in Management Information Systems at University of Nevada - Las Vegas.
Reviews for MANAGEMENT INFO SYSTEMS
Report this Material
What is Karma?
Karma is the currency of StudySoup.
Date Created: 10/25/15
Chapter 6 Chapter 10 Securing Information Systems Ethics Crime Some key terms Ethics Information age Computer literacy Digital divide Information privacy security Identity theft How to Maintain Your Privacy Online Choose secure Monitored Veri ed websites Read the privacy security policy Be careful about cookies Anonymous surfing Con rmation optout emails Identity theft Information accuracy Information property 0 Intellectual property fair use 0 Data privacy 0 Spam cookies spyware o Cybersquatting The need for an ethical code of conduct 0 Many organizations have distinct ethical guidelines 0 Technical organizations are the same way 0 Responsible computer use 0 Leads to the introduction of computer crime Computer Crime 0 Definition 0 The computer information access debate 0 Unauthorized computer access 0 Laws 0 Computer Fraud and Abuse Act of 1986 0 Electronic Communications Privacy Act of 1986 0 Computer forensics o Hacking cracking black hat white hat 0 Who commits these crimes 0 Piracy Information Systems Security 0 Ways systems are most often compromised o Unauthorized access I CAPTCHA 0 Information Modi cation 0 Denial of Service 0 Zombie computers 0 Computer Viruses o Viruses o Worms 0 Trojan Horses 0 EVil twins 0 Keyloggers o Ransomware 0 Spyware Spam and Spoo ng 0 Adware 0 Spam 0 Phishing o Pharming o 419 Scam o Other threats to IS security 0 Unsecure available default passwords and access codes 0 Missing or outdated antivirus software 0 Employees indiscretion 0 Organizations failing to limit access 0 Failing to install rewalls andor intruder detection 0 Ineffective employee background checks 0 Employee theft 0 Retribution Three Categories of Security 0 Physical 0 Logical o Behavioral Access Control Authentication o Passwords o Tokens 0 Smart cards 0 Biometrics o Encryption Health Risks o Repetitive stress injury 0 Carpal Tunnel Syndrome 0 Computer Vision Syndrome o Technostress