1.Describe how the development oin IT from stand-alone computers to modern networked distributed systems have resulted in information systems which may be vulnerable to security breaches?2. Describe THREE examples of deliberate breaches of security in an information system?3. Describe THREE counter-measures that an information systems manager may put in place to counter these types of security threat?

Showing Answers 1 - 1 of 1 Answers

opbang

  • Sep 23rd, 2006
 

1.Describe how the development oin IT from stand-alone computers to modern networked distributed systems have resulted in information systems which may be vulnerable to security breaches?

 

Stand Alone Computer.

Diskless / Thin Client and Server Environment

Client / Server Environment

Peer to Peer Network Environment

Cluster Server and Thin Client Environment

Distributed Computing Environment

 


2. Describe THREE examples of deliberate breaches of security in an information system?

 

Hacking

Staff misuses information

Un Authorized Access of Outsider

Computer Theft and Fraud

Missing Backup Tapes

Fraud Account Created

Identity Theft

 

3. Describe THREE counter-measures that an information systems manager may put in place to counter these types of security threat?

 

Organizational Security Policy should be in place, followed, audited, drill test.

System should clearly speak about : Identity Management, Patch Management, Backup Management,  Virus, Antispyware softwares should be in place and updated regularly.  For a large Information Based Organisation DMZ setup.

Secure your information infrastructure, and conduct vulnerability test.

 

 

  Was this answer useful?  Yes

Give your answer:

If you think the above answer is not correct, Please select a reason and add your answer below.

 

Related Answered Questions

 

Related Open Questions