Upload
baba97k
View
212
Download
0
Embed Size (px)
DESCRIPTION
mis
Citation preview
13-*Identify several ethical issues in how the use of information technologies in business affectsEmploymentIndividualityWorking conditionsPrivacyCrimeHealthSolutions to societal problemsQuestion 13
13-*Learning ObjectivesIdentify several types of security management strategies and defenses, and explain how they can be used to ensure the security of business applications of information technologyPropose several ways that business managers and professionals can help to lessen the harmful effects and increase the beneficial effects of the use of information technology
13-*IT Security, Ethics, and Society
13-*Security Management at Big BazaarThe goal of security management is accuracy, integrity, and safety of all information system processes and resources
13-*Internetworked Security DefensesEncryptionData is transmitted in scrambled formIt is unscrambled by computer systems for authorized users onlyThe most widely used method uses a pair of public and private keys unique to each individual
13-*Internetworked Security DefensesFirewallsA gatekeeper system that protects Big Bazaar intranets and other computer networks from intrusionProvides a filter and safe transfer point for access to/from the Internet and other networksImportant for individuals who connect to the Internet with DSL or cable modemsCan deter hacking, but cannot prevent it
13-*Internetworked Security DefensesEmail MonitoringUse of content monitoring software that scans for troublesome words that might compromise corporate securityVirus DefensesCentralize the updating and distribution of antivirus softwareUse a security suite that integrates virus protection with firewalls, Web security, and content blocking features
13-*Auditing IT SecurityIT Security AuditsPerformed by internal or external auditorsReview and evaluation of security measures and management policiesGoal is to ensure that that proper and adequate measures and policies are in place