Laudon Ess7 ch07
Laudon Ess7 ch07
Laudon Ess7 ch07
Securing Information
Systems
7.1
7.2
7.6
Figure 7-1,
The architecture of a Web-based application typically includes a Web client, a server, and corporate
information systems linked to databases. Each of these components presents security challenges and
vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any
7.7
2007 by Prentice Hall
point in the network
Worms a self-replicating virus that does not alter files but resides
in active memory and duplicates itself.
Spyware
Key loggers
7.8
Cont
7.10
Identity theft :
Phishing, misrepresented Websites
evil twins, misrepresented hotspot
pharming, redirect to their Web page
by gaining access to your IP address
from ISP list
7.12
Figure 7-3
2007 by Prentice Hall
Software Vulnerability
Commercial software contains flaws that create
security vulnerabilities
Patches
7.13
7.14
7.15
7.16
ISO 17799
Risk assessment
Security policy
Chief security officer (CSO)
Acceptable use policy (AUP)
Authorization policies
Authorization management systems
7.17
7.19
Access Control
Authentication
Tokens
Smart cards hotel key, cash card
Biometric authentication
7.20
A Corporate Firewall
7.23
Figure 7-6
2007 by Prentice Hall
7.24