8
13-1 Identify several ethical issues in how the use of information technologies in business affects • Employment • Individuality • Working conditions • Privacy • Crime • Health • Solutions to societal problems Question 13

Document13

  • Upload
    baba97k

  • View
    212

  • Download
    0

Embed Size (px)

DESCRIPTION

mis

Citation preview

  • 13-*Identify several ethical issues in how the use of information technologies in business affectsEmploymentIndividualityWorking conditionsPrivacyCrimeHealthSolutions to societal problemsQuestion 13

  • 13-*Learning ObjectivesIdentify several types of security management strategies and defenses, and explain how they can be used to ensure the security of business applications of information technologyPropose several ways that business managers and professionals can help to lessen the harmful effects and increase the beneficial effects of the use of information technology

  • 13-*IT Security, Ethics, and Society

  • 13-*Security Management at Big BazaarThe goal of security management is accuracy, integrity, and safety of all information system processes and resources

  • 13-*Internetworked Security DefensesEncryptionData is transmitted in scrambled formIt is unscrambled by computer systems for authorized users onlyThe most widely used method uses a pair of public and private keys unique to each individual

  • 13-*Internetworked Security DefensesFirewallsA gatekeeper system that protects Big Bazaar intranets and other computer networks from intrusionProvides a filter and safe transfer point for access to/from the Internet and other networksImportant for individuals who connect to the Internet with DSL or cable modemsCan deter hacking, but cannot prevent it

  • 13-*Internetworked Security DefensesEmail MonitoringUse of content monitoring software that scans for troublesome words that might compromise corporate securityVirus DefensesCentralize the updating and distribution of antivirus softwareUse a security suite that integrates virus protection with firewalls, Web security, and content blocking features

  • 13-*Auditing IT SecurityIT Security AuditsPerformed by internal or external auditorsReview and evaluation of security measures and management policiesGoal is to ensure that that proper and adequate measures and policies are in place