 |  Management Information Systems: Solving Business Problems with Information Technology, 3/e Gerald V. Post,
University of the Pacific David L. Anderson,
DePaul U/McGowan Center
Security, Privacy, and Anonymity
Chapter 4 Objectives
I.What are the security threats to information systems? |
 |  |  | II.What controls exist to protect the systems? |
 |  |  | III.How do computers identify users? |
 |  |  | IV.What alternative security measures need to be taken? |
 |  |  | V.What is encryption and how does it solve several problems? |
 |  |  | VI.What specific security problems does the Internet create? |
 |  |  | VII.Can there be privacy with computers and the Internet? |
 |  |  | VIII.What are the advantages and problems with anonymity? |
|