Securing Information Systems

6 important questions on Securing Information Systems

Why are information systems vulnerable to destruction, error and abuse?

- Wireless systems are hard to secure
- People are often the weakest link

Policies, procedures and technical measures used to prevent unauthorised acces, alteration, theft or physical damage to information systems

Security

Methods, policies, and organisational procedure that ensure safety of organisation's assets; accuracy and reliability of its accounting records; and operational adherence to management standards

Controls
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

What is a sniffer?

- Eavesdropping program that monitors information traveling over network
- Enables hackers to steal proprietary information such as e-mail, company files and so on

What is Identity theft?

Theft of personal information (Social security ID, credit card numbers, driver's license) to impersonate someone else

What is Evil twins?

Wireless networks that pretend to offer trustworthy Wi-Fi connections to the internet

The question on the page originate from the summary of the following study material:

  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
Remember faster, study better. Scientifically proven.
Trustpilot Logo