Chapter_21_computer_Sec

Chapter_21_computer_Sec - information handled by computers...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
    Chapter 21 Computer and Information  Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
    Introduction  (pg 399-400) All sectors of a modern society are affected by the predominant  use of computers.  One of the fastest growing problems associated with the misuse  of computers is identity theft
Background image of page 2
    CSO-CIO Interactions  (pg. 400-401) Since computers are such a vital part of businesses, many firms  have developed a full-time position for the study and control of 
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: information handled by computers. They are referred to as the Chief Information Officer (CIO) or Intellectual Technology (IT). Cooperation between the Chief Information Officer (CIO) and the Chief Security Officer (CSO) is critical for adequate protection of company intellectual property....
View Full Document

This note was uploaded on 04/13/2008 for the course CJ 385 taught by Professor Nalla during the Spring '08 term at Michigan State University.

Page1 / 4

Chapter_21_computer_Sec - information handled by computers...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online