• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611
Fundamentals of Information Systems Security: (Information Systems Security & Assurance) - Standalone book

Fundamentals of Information Systems Security: (Information Systems Security & Assurance) - Standalone book

Paperback

Computer Security

Currently unavailable to order

ISBN10: 1691425680
ISBN13: 9781691425686
Publisher: Independently Published
Published: Sep 6 2019
Pages: 70
Weight: 0.25
Height: 0.17 Width: 5.98 Depth: 9.02
Language: English
Fundamentals of Information Systems Security(Information Systems Security & Assurance) - Standalone bookInformation systems are exposed to different types of security risks. Theconsequences of information systems security (ISS) breaches can vary from e.g. damaging the data base integrity to physical destruction of entire information system facilities, and can result with minor disruptions in less important segments of information systems, or with significant interruptions in information systems functionality. The sources of security risks are different, and can origin from inside or outside of information system facility, and can be intentional or unintentional. The precise calculation of loses caused by such incidents is often not possible because a number of small scale ISS incidents are never detected, or detected with a significant time delay, a part of incidents are interpreted as an accidental mistakes, and all that results with an underestimation of ISS risks. This paper addresses the different types and criteria of information system security risks (threats) classification and gives an overview of most common classifications used in literature and in practice. We define a common set of criteria that can be used for information system security threats classification, which will enable the comparison and evaluation of different security threats from different security threats classifications.

Also in

Computer Security