| Management Information Systems: Solving Business Problems with Information Technology, 3/e Gerald V. Post,
University of the Pacific David L. Anderson,
DePaul U/McGowan Center
Security, Privacy, and Anonymity
Chapter 4 Objectives
I.What are the security threats to information systems? |
| | | II.What controls exist to protect the systems? |
| | | III.How do computers identify users? |
| | | IV.What alternative security measures need to be taken? |
| | | V.What is encryption and how does it solve several problems? |
| | | VI.What specific security problems does the Internet create? |
| | | VII.Can there be privacy with computers and the Internet? |
| | | VIII.What are the advantages and problems with anonymity? |
|