What are the risks in a business information system?
Name the 5 threats in a computerized environment
What are access controls?
Limit access to documentation, data files, programs, and computer hardware to authorized personnel.
Ex: locks, passwords, users identification codes, assignment of security levels, callbacks on dial-up systems, the setting of file attributes, and the use of firewalls
What is a firewall?
System, often both hardware and software, of user identification and authentification that prevents unauthorized users from gaining access to network resources