8.1. Chapter Introduction

Learning Outcomes

Upon successful completion of this chapter, you will be able to:

  • Discuss the impact of cybercrime in Canada;
  • Describe information technologies that are used in computer crimes;
  • Explain the major security threats;
  • Define the information security triad;
  • Discuss the information security tools used in safeguarding computers and networks; and
  • Outline the process to secure yourself digitally.

Since computers and other digital devices have become essential to business, they have become increasingly targets for attacks. For a company or an individual to use a computing device with confidence, they must first be assured that the device is not compromised in any way and that all communications are secure. This chapter discusses cybercrime and its impact on Canadian organizations.  It also reviews the fundamental concepts of information systems security and discusses some of the measures that can be taken to mitigate security threats. Finally, you will review a list of security precautions that individuals can take in order to secure their personal computing environment.


“Chapter 6: Information Systems Security” from Information Systems for Business and Beyond (2019) by David Bourgeois is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License, except where otherwise noted.

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Information Systems for Business and Beyond Copyright © 2022 by Shauna Roch; James Fowler; Barbara Smith; and David Bourgeois is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book