カテゴリー 全て - security - forensics - malware - encryption

によって lama hazaa 6年前.

142

Sample Mind Map

Ensuring the security and control of information systems is crucial for businesses, especially when handling electronic evidence and computer forensics. Digital evidence plays a significant role in uncovering white-collar crimes, with proper data management streamlining legal discovery processes.

Sample Mind Map

Securing Information Systems

Technologies and Tools for Protecting Information Resources

1- Access control
2-Authentication
3-Techniques for preventing unauthorized access to a system are listed
Tokens
Password system
4-Technologies and Tools for Security
Smart card
Biometric authentication
Unified threat management (UTM) systems
Intrusion Detection Systems, and Antivirus Software
Antivirus and anti-spyware software: 1-Antivirus 2-Anti-spyware software
Intrusion detection systems:
Encryption and Public Key Infrastructure
Two methods of encryption:Symmetric key encryption and Public key encryption
Two methods for encryption on networks:(SSL) and (TLS)
Encryption

Establishing a Framework for Security and Control

The rule MIS auditing
Disaster Recovery Planning and Business Continuity Planning
make info

easier to remember

interesting

save time
3-Identity management
2- Acceptable use policy (AUP)
1- Risk assessment
Probability of occurrence during year
Potential losses, value of threat
Expected annual loss

Business Value of Security and Control

Electronic Evidence and Computer Forensics
4- Ambient data
2- Proper control of data can save time, money when responding to legal discovery request
3- Computer forensics
1-Evidence for white collar crimes often found in digital form
Legal and Regulatory Requirements for Electronic Records Management
Sarbanes-Oxley Act
HIPPA
Gramm-Leach-Bliley Act

System vulnerability

software vulnerability
commercial software contains flaws that create security vulnerability
internal threats: employee
social engineering
security threats often originate inside an organization
Computer crime
click fraud
pharming
evil twins
phishing
identity theft
Hackers and computer crime
distributed denial-of-service
denial-of-service attacks(DoS)
sniffer
cracker
Hacker
Malicious software
spyware
3- Trojan horses
2-worms
1- viruses
Larg public networks facing threats because:
4- Network open to anyone
3- Email used for transmitting trade secret
2- size of the internet
1- Email attachment
Wireless security challenges
2- the service set identifiers
1- war driving
Storing problems
4-Use of networks and computer outside of firms control
3- Disasters
2- Hardware problems
1- software problems
security
control
Subtopic