| Management Information Systems: Solving Business Problems with Information Technology, 3/e Gerald V. Post,
University of the Pacific David L. Anderson,
DePaul U/McGowan Center
Security, Privacy, and Anonymity
Chapter Outline
- Overview
- Introduction
- Threats to Information
- Disasters
- Employees and Consultants
- Business Partnerships
- Outsiders
- Viruses
- Computer Security Controls
- Manual and Electronic Information
- Data Backup
- User Identification
- Access Control
- Additional Security Measures
- Audits
- Physical Access
- Monitoring
- Hiring and Employee Evaluation
- Encryption
- Single Key
- Public Key Infrastructure
- E-Commerce Security Issues
- Data Transmission
- Wireless Networks
- Carnivore, Echelon, and Escrow Keys
- Theft of Data from Servers
- Denial of Service
- Firewalls and Intrusion Detection
- Privacy
- Wireless and M-Commerce
- Consumer Privacy Statements
- Worker Monitoring
- E-Commerce, Cookies, and Third Parties
- Privacy Laws and Rules
- Anonymity
- Summary
- Key Words
- Website References
- Additional Reading
- Review Questions
- Exercises
- Cases: Wholesale Trade
- Appendix: Encrypting E-Mail
- Obtaining a Security Certificate
- Installing a Certificate and Encrypting Messages
- Exercises
|
|