Chapter 13: Information Security: Barbarians at the Gateway (and Just About Everywhere Else)

13.1 Introduction
13.2 Why Is This Happening? Who Is Doing It? And What’s Their Motivation?
13.3 Where Are Vulnerabilities? Understanding the Weaknesses
13.4 Taking Action

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Information Systems Copyright © 2015 by University of Minnesota is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.