McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Glossary
Acronyms
Exercise Files
Link to Jerry Post
Additional Appendixes
Discussion Issues
Rolling Thunder
End of Text Cases
Additional Models
Chapter Objectives
PowerPoint Presentations
Chapter Outline
Chapter Summary
Multiple Choice Quiz
True or False
Fill in the Blanks
Chapter Exercises
Internet Links/References
Chapter Review Questions
Feedback
Help Center


Management Information Systems: Solving Business Problems with Information Technology, 3/e
Gerald V. Post, University of the Pacific
David L. Anderson, DePaul U/McGowan Center

Security, Privacy, and Anonymity

Chapter Outline


  1. Overview
  2. Introduction
  3. Threats to Information
    1. Disasters
    2. Employees and Consultants
    3. Business Partnerships
    4. Outsiders
    5. Viruses
  4. Computer Security Controls
    1. Manual and Electronic Information
    2. Data Backup
    3. User Identification
    4. Access Control
  5. Additional Security Measures
    1. Audits
    2. Physical Access
    3. Monitoring
    4. Hiring and Employee Evaluation
  6. Encryption
    1. Single Key
    2. Public Key Infrastructure
  7. E-Commerce Security Issues
    1. Data Transmission
    2. Wireless Networks
    3. Carnivore, Echelon, and Escrow Keys
    4. Theft of Data from Servers
    5. Denial of Service
    6. Firewalls and Intrusion Detection
  8. Privacy
    1. Wireless and M-Commerce
    2. Consumer Privacy Statements
    3. Worker Monitoring
    4. E-Commerce, Cookies, and Third Parties
    5. Privacy Laws and Rules
  9. Anonymity
  10. Summary
  11. Key Words
  12. Website References
  13. Additional Reading
  14. Review Questions
  15. Exercises
  16. Cases: Wholesale Trade
  17. Appendix: Encrypting E-Mail
    1. Obtaining a Security Certificate
    2. Installing a Certificate and Encrypting Messages
    3. Exercises




McGraw-Hill/Irwin