Page 21 -
P. 21
20
Contents
Q10-5 How Can Technical Safeguards Protect Against Security
Threats? 433
Identification and Authentication 433
• Ethics Guide: Securing Privacy 434
Single Sign-on for Multiple Systems 436
Encryption 436
Firewalls 437
Malware Protection 438
Design for Secure Applications 440
Q10-6 How Can Data Safeguards Protect Against Security Threats? 440
Q10-7 How Can Human Safeguards Protect Against Security
Threats? 441
Human Safeguards for Employees 441
Human Safeguards for Nonemployee Personnel 443
Account Administration 444
Systems Procedures 445
Security Monitoring 446
Q10-8 How Should Organizations Respond to Security Incidents? 447
Q10-9 2026? 448
• Security Guide: EMV to the Rescue 450
• Guide: Phishing for Credit Cards, Identifying Numbers, Bank Accounts 452
Case Study 10: Hitting the Target 456
11: InforMaTIon SySTeMS
ManaGeMenT 461
Q11-1 What Are the Functions and Organization of the IS
Department? 463
How Is the IS Department Organized? 464
Security Officers 465
What IS-Related Job Positions Exist? 465
Q11-2 How Do Organizations Plan the Use of IS? 467
Align Information Systems with Organizational Strategy 467
• So What? Managing the IS Department 468
Communicate IS Issues to the Executive Group 469
Develop Priorities and Enforce Them Within the IS Department 469
Sponsor the Steering Committee 469
Q11-3 What Are the Advantages and Disadvantages of
Outsourcing? 469
• Ethics Guide: Privacy Versus Productivity: The BYOD Dilemma? 470
Outsourcing Information Systems 472
International Outsourcing 473
What Are the Outsourcing Alternatives? 474
What Are the Risks of Outsourcing? 474