Kenneth C. Laudon,Jane P. Laudon Management Information System 12th Edition pdf



Download 15,21 Mb.
Pdf ko'rish
bet275/645
Sana20.01.2022
Hajmi15,21 Mb.
#393158
1   ...   271   272   273   274   275   276   277   278   ...   645
Bog'liq
Kenneth C. Laudon ( PDFDrive ) (1)

Computer forensics

is the


scientific collection, examination, authentication, preservation, and analysis of

data held on or retrieved from computer storage media in such a way that the

information can be used as evidence in a court of law. It deals with the following

problems:

• Recovering data from computers while preserving evidential integrity

• Securely storing and handling recovered electronic data

• Finding significant information in a large volume of electronic data

• Presenting the information to a court of law

Electronic evidence may reside on computer storage media in the form of

computer files and as 



ambient data

, which are not visible to the average user. An

example might be a file that has been deleted on a PC hard drive. Data that a

computer user may have deleted on computer storage media can be recovered

through various techniques. Computer forensics experts try to recover such

hidden data for presentation as evidence. 

An awareness of computer forensics should be incorporated into a firm’s

contingency planning process. The CIO, security specialists, information

systems staff, and corporate legal counsel should all work together to have a

plan in place that can be executed if a legal need arises. You can find out more

about computer forensics in the Learning Tracks for this chapter.



308

Part Two


Information Technology Infrastructure

8.3


E

STABLISHING A

F

RAMEWORK FOR



S

ECURITY


AND

C

ONTROL



Even with the best security tools, your information systems won’t be reliable

and secure unless you know how and where to deploy them. You’ll need to

know where your company is at risk and what controls you must have in place

to protect your information systems. You’ll also need to develop a security

policy and plans for keeping your business running if your information systems

aren’t operational.

INFORMATION SYSTEMS CONTROLS

Information systems controls are both manual and automated and consist of

both general controls and application controls. 


Download 15,21 Mb.

Do'stlaringiz bilan baham:
1   ...   271   272   273   274   275   276   277   278   ...   645




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2025
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish