Page 16 - Using MIS
P. 16

xx        Contents
                                    Q2  How Big Is the Computer Security Problem? 395


                                    Q3  How Should You Respond to Security Threats? 397

                                    Q4  How Should Organizations Respond to Security Threats? 400

                                    Q5  How Can Technical Safeguards Protect Against Security
                                          Threats? 401
                                          Identification and Authentication 401
                                          •  Ethics Guide: Securing Privacy 402
                                          Single Sign-on for Multiple Systems 404
                                          Encryption 404
                                          Firewalls 406
                                          Malware Protection 407
                                          Design for Secure Applications 408
                                    Q6  How Can Data Safeguards Protect Against Security
                                          Threats? 409

                                    Q7  How Can Human Safeguards Protect Against Security
                                          Threats? 409
                                          Human Safeguards for Employees 410
                                          Human Safeguards for Nonemployee Personnel 412
                                          Account Administration 412
                                          Systems Procedures 413
                                          Security Monitoring 414
                                    Q8  How Should Organizations Respond to Security
                                          Incidents? 415

                                    Q9  2025? 416
                                          •  Security Guide: A Look through NSA’s PRISM 418
                                          • Guide: Phishing for Credit Cards, Identifying Numbers, Bank Accounts 420
                                          Case Study 10: Hitting the Target 424





        11:  InforMaTIon SySTeMS
                 ManaGeMenT 427




                                    Q1  What Are the Functions and Organization of the IS
                                          Department? 429
                                          How Is the IS Department Organized? 430
                                          Security Officers 431
                                          What IS-Related Job Positions Exist? 432
                                    Q2  How Do Organizations Plan the Use of IS? 433
                                          Align Information Systems with Organizational Strategy 433
                                          Communicate IS Issues to the Executive Group 435
   11   12   13   14   15   16   17   18   19   20   21