Page 140

The University of SydneyPage 67How do we provide IS security ?–Would it be the management of access control to a given computer system?–Would it be the installation of a firewall around an organizations network?–Would it be the delineation of responsibilities and authorities in an organization?–Would it be the matching of such responsibilities and authorities to the computer system access privileges?–Would we consider including a security culture as part of managing information systems security?–Etc…–3 System model will help us answer all these questions in the rest of the course !