Page 360 -
P. 360

Chapter 8 Securing Information Systems 359


                   •  Describe the function of risk assessment and      •  Explain how encryption protects information.
                      explain how it is conducted for information       •  Describe the role of encryption and digital
                      systems.                                               certificates in a public key infrastructure.
                   •  Define and describe the following: security       •  Distinguish between fault tolerance and high-
                        policy, acceptable use policy, and identity        availability computing, and between di saster
                        management.                                        recovery planning and business continuity
                   •  Explain how MIS auditing promotes security           planning.
                      and control.                                      •  Identify and describe the security problems
                 4.  What are the most important tools and technolo-       posed by cloud computing.
                   gies for safeguarding information resources?         •  Describe measures for improving software
                   •  Name and describe three authentication               quality and reliability.
                        methods.
                   •  Describe the roles of firewalls, intrusion
                        detection systems, and antivirus software in
                      promoting security.






               Discussion Questions

                 1.  Security isn’t simply a technology issue, it’s a   3.  Suppose your business had an  e-commerce Web
                   business issue. Discuss.                             site where it sold goods and accepted credit card
                 2.  If you were developing a business continuity       payments. Discuss the major security threats to
                   plan for your company, where would you start?        this Web site and their potential impact. What
                   What aspects of the business would the plan          can be done to minimize these threats?
                   address?

















































   MIS_13_Ch_08 Global.indd   359                                                                             1/17/2013   3:10:24 PM
   355   356   357   358   359   360   361   362   363   364   365