保护信息系统外文翻译资料

 2022-06-14 10:06

Chapter 8

Securing Information Systems

Learning Objectives

Why are information systems vulnerable to destruction, error, and abuse?

What is the business value of security and control?

What are the components of an organizational framework for security and control?

What are the most important tools and technologies for safeguarding information resources?

Chapter Outline

8.1 System Vulnerability and Abuse

Why Systems are Vulnerable

Malicious Software: Viruses, Worms, Trojan Horses, and Spyware

Hackers and Computer Crime

Internal Threats: Employees

Software Vulnerability

8.2 Business Value of Security and Control

Legal and Regulatory Requirements for Electronic Records Management

Electronic Evidence and Computer Forensics

8.3 Establishing a Framework for Security and Control

Information Systems Controls

Risk Assessment

Security Policy

Disaster Recovery Planning and Business Continuity Planning

The Role of Auditing

8.4 Technologies and Tools for Protecting Information Resources

Identity Management and Authentication

Firewalls, Intrusion Detection Systems, and Antivirus Software

Securing Wireless Networks

Encryption and Public Key Infrastructure

Ensuring System Availability

Security Issues for Cloud Computing and the Mobile Digital Platform

Ensuring Software Quality

Key Terms

The following alphabetical list identifies the key terms discussed in this chapter. The page number for each key term is provided.

Acceptable use policy (AUP), 312

Identify theft, 302

Antivirus software, 318

Intrusion detection systems, 318

Application controls, 310

Key loggers, 300

Authentication, 316

Malware, 298

Biometric authentication, 316

Managed security service providers (MSSPs), 322

Botnet, 301

MIS audit, 314

Bugs, 305

Online transaction processing, 321

Business continuity planning, 314

Password, 316

Click fraud, 304

Patches, 307

Computer crime, 302

Pharming, 303

Computer forensics, 309

Phishing, 303

Computer virus, 298

Public key encryption, 320

Controls, 295

Public key infrastructure (PKI), 320

Cybervandalism, 300

Recovery-oriented computing, 321

Cyberwarfare, 304

Risk assessment, 311

Deep packet inspection, 322

Sarbanes-Oxley Act, 309

Denial-of-service (DoS) attack, 301

Secure Hypertext Transfer Protocol (S-HTTP), 319

Digital certificates, 320

Secure Sockets Layer (SSL), 319

Disaster recovery planning, 314

Security, 295

Distributed denial-of-service (DDos) attack, 301

Security policy, 312

Downtime, 321

Smart card, 316

Drive-by download, 298

Sniffer, 301

Encryption, 319

Social engineering, 305

Evil twin, 303

Spoofing, 301

Fault tolerant computer systems, 321

Spyware, 300

Firewall, 317

SQL injection attack, 300

General controls, 310

Token, 316

Gramm-Leach-Bliley Act, 309

Trojan Horse, 299

Hacker, 300

Unified threat management (UTM), 319

High-availability computing, 321

War driving, 297

HIPAA, 308

Worms, 298

Identity management, 312

Teaching Suggestions

The opening case, “Yoursquo;re on LinkedIn? Watch Out!,” describes several different ways information systems become vulnerable to malicious software— individual userrsquo;s computers, their friendsrsquo; computers, and computers of LinkedIn-participating businesses. Because of its huge user base, an easy-to-use Web site, and a community of users easily linked to dozens or hundreds of other users, the popular business networking site has become a huge security risk to individuals and businesses.

This case also shows that no single approach to securing information systems is sufficient. Businesses must continually upgrade their security software and try to stay one step ahead of hackers and computer criminals. Securing information systems from unauthorized access, abuse, destruction, or tampering of assets requires a combination of training, procedures, and technologies. The cost and difficulty of using all of these must be balanced with the net benefits they provide the business in the form of greater customer trust, uninterrupted operations, compliance with government regulations, and protection of financial assets. However, as the text states, developing a secure password system would only have cost the company a minimal amount of money, in the low six figures. After the hacking incident, the company faces a $5 million dollar class-action lawsuit. <!--

全文共56988字,剩余内容已隐藏,支付完成后下载完整资料


Chapter 8 8

Securing Information Systems 保护信息系统

Learning 学习 Objectives 目标

  1. Why are information systems vulnerable to destruction, error, and abuse? 为什么信息系统容易受到破坏,错误和滥用?
  2. What is the business value of security and control? 安全和控制的商业价值是什么?
  3. What are the components of an organizational framework for security and control? 安全和控制组织框架的组成部分是什么?
  4. What are the most important tools and technologies for safeguarding information resources? 什么是保护信息资源最重要的工具和技术?

Chapter Outline 本章大纲

8 .1 8.1 System Vulnerability and Abuse系统漏洞和滥用

Why Systems are Vulnerable 为什么系统是脆弱的

Malicious Software: 恶意软件: Viruses, Worms, Trojan Horses, and Spyware 病毒,蠕虫,特洛伊木马和间谍软件

Hackers and Computer Crime 黑客和 计算机犯罪

Internal Threats: Employees 内部 威胁:员工

Software Vulnerability 软件漏洞

8 . 8.22 Business Value of Security and Control 安全和控制的商业价值

Legal and Regulatory Requirements for Electronic Records Management 电子记录管理的法律和法规要求

Electronic Evidence and Computer Forensics 电子证据和计算机取证

8 .3 8.3 Establishing a Framework for Security and Control 建立安全和控制框架

Information Systems Controls 信息系统控制

Risk Assessment 风险评估

Security Policy 安全策略

Disaster Recovery Planning and Business Continuity Planning 灾难恢复计划和 业务连续性 计划

The Role of Auditing 审计的作用

8 .4 8 .4 Technologies and Tools for Protecting Information Resources 保护信息资源的 技术和工具

Identity Management and Authentication 身份管理和身份验证

Firewalls, Intrusion Detection Systems, and Antivirus Software 防火墙,入侵检测系统和防病毒软件

Securing Wireless Networks 确保无线网络安全

Encryption and Public Key Infrastructure 加密和公钥基础设施

Ensuring System Availability 确保系统可用性

Security Issues for Cloud Computing and the Mobile Digital Platform 云计算和移动数字平台的安全问题

Ensuring Software Quality 确保软件质量

Key Terms 关键术语

The following alphabetical list identifies the key terms discussed in this chapter. 以下按字母顺序排列的列表标识了本章中讨论的关键术语。 The page number for each key term is provided. 提供了每个关键术语的页码。

Acceptable use policy (AUP), 312 可接受使用政策(AUP),312

Identify theft, 302 识别盗窃302

Antivirus software, 318 防病毒软件,318

Intrusion detection systems, 318 入侵检测系统,318

Application controls, 310 应用程序控制,310

Key loggers, 300 键盘记录器,300

Authentication, 316 认证,316

Malware, 298 恶意软件,298

Biometric authentication, 316 生物认证,316

Managed security service providers (MSSPs), 322 托管安全服务提供商(MSSP),322

Botnet, 301 僵尸网络,301

MIS audit, 314 MIS审计,314

Bugs, 305 错误,305

Online transaction processing, 321 在线交易处理,321

Business continuity planning, 314 业务连续性计划,314

Password, 316 密码,316

Click fraud, 304 点击欺诈,304

Patches, 307 补丁,307

Computer crime, 302 计算机犯罪,302

Pharming, 303 法尔明,303

Computer forensics, 309 计算机取证,309

Phishing, 303 网络钓鱼,303

Computer virus, 298 计算机病毒,298

Public key encryption, 320 公钥加密,320

Controls, 295 控件,295

Public key infrastructure (PKI), 320 公钥基础设施(PKI),320

Cybervandalism, 300 Cyber​​vandalism,300

Recovery-oriented computing, 321 面向恢复的计算,321

Cyberwarfare, 304 网络战争,304

Risk assessment, 311 风险评估311

Deep packet inspection, 322 深度数据包检测,322

Sarbanes-Oxley Act, 309 萨班斯 - 奥克斯利法案,309

Denial-of-service (DoS) attack, 301 拒绝服务(DoS)攻击,301

Secure Hypertext Transfer Protocol (S-HTTP), 319 安全超文本传输​​协议(S-HTTP),319

Digital certificates, 320 数字证书,320

Secure Sockets Layer (SSL), 319 安全套接字层(SSL),319

Disaster recovery planning, 314 灾难恢复计划,314

Security, 295 安全,295

Distributed denial-of-service (DDos) attack, 301 分布式拒绝服务(DDos)攻击,301

Security policy, 312 安全政策,312

Downtime, 321 停机时间,321

Smart card, 316 智能卡,316

Drive-by download, 298 开车下载,298

Sniffer, 301 嗅探器,301

Encryption, 319 加密,319

Social engineering, 305 社会工程,305

Evil twin, 303 邪恶的双胞胎,303

Spoofing, 301 欺骗,301

Fault tolerant computer systems, 321 容错计算机系统,321

Spyware, 300 间谍软件,300

Firewall, 317 防火墙,317

SQL i

全文共19713字,剩余内容已隐藏,支付完成后下载完整资料


资料编号:[10951],资料为PDF文档或Word文档,PDF文档可免费转换为Word

原文和译文剩余内容已隐藏,您需要先支付 30元 才能查看原文和译文全部内容!立即支付

以上是毕业论文外文翻译,课题毕业论文、任务书、文献综述、开题报告、程序设计、图纸设计等资料可联系客服协助查找。