Page 16 - Using MIS
P. 16
xx Contents
Q2 How Big Is the Computer Security Problem? 395
Q3 How Should You Respond to Security Threats? 397
Q4 How Should Organizations Respond to Security Threats? 400
Q5 How Can Technical Safeguards Protect Against Security
Threats? 401
Identification and Authentication 401
• Ethics Guide: Securing Privacy 402
Single Sign-on for Multiple Systems 404
Encryption 404
Firewalls 406
Malware Protection 407
Design for Secure Applications 408
Q6 How Can Data Safeguards Protect Against Security
Threats? 409
Q7 How Can Human Safeguards Protect Against Security
Threats? 409
Human Safeguards for Employees 410
Human Safeguards for Nonemployee Personnel 412
Account Administration 412
Systems Procedures 413
Security Monitoring 414
Q8 How Should Organizations Respond to Security
Incidents? 415
Q9 2025? 416
• Security Guide: A Look through NSA’s PRISM 418
• Guide: Phishing for Credit Cards, Identifying Numbers, Bank Accounts 420
Case Study 10: Hitting the Target 424
11: InforMaTIon SySTeMS
ManaGeMenT 427
Q1 What Are the Functions and Organization of the IS
Department? 429
How Is the IS Department Organized? 430
Security Officers 431
What IS-Related Job Positions Exist? 432
Q2 How Do Organizations Plan the Use of IS? 433
Align Information Systems with Organizational Strategy 433
Communicate IS Issues to the Executive Group 435