Site MapHelpFeedbackEthics and Information Security: MIS Business Concerns
Ethics and Information Security: MIS Business Concerns


LO4.1Explain the ethical issues in the use of information technology.
LO4.2Identify the six epolicies organizations should implement to protect themselves.
LO4.3Describe the relationships and differences between hackers and viruses.
LO4.4Describe the relationship between information security policies and an information security plan.
LO4.5Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.










M: Information Systems 3eOnline Learning Center

Home > Chapter 4