380 likes | 697 Views
Outline. How do you protect your information resources? What are the primary threats to an information system?What primary options are used to provide computer security?What non-computer-based tools can be used to provide additional security? How do you protect data when unknown people might be
E N D
1. Introduction to MIS Chapter 5 Computer Security