McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Glossary
Acronyms
Exercise Files
Link to Jerry Post
Additional Appendixes
Discussion Issues
Rolling Thunder
End of Text Cases
Additional Models
Chapter Objectives
PowerPoint Presentations
Chapter Outline
Chapter Summary
Multiple Choice Quiz
True or False
Fill in the Blanks
Chapter Exercises
Internet Links/References
Chapter Review Questions
Feedback
Help Center


Management Information Systems: Solving Business Problems with Information Technology, 3/e
Gerald V. Post, University of the Pacific
David L. Anderson, DePaul U/McGowan Center

Security, Privacy, and Anonymity

Chapter 4 Objectives


I.

What are the security threats to information systems?

II.

What controls exist to protect the systems?

III.

How do computers identify users?

IV.

What alternative security measures need to be taken?

V.

What is encryption and how does it solve several problems?

VI.

What specific security problems does the Internet create?

VII.

Can there be privacy with computers and the Internet?

VIII.

What are the advantages and problems with anonymity?




McGraw-Hill/Irwin