{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

test2_pracques - Test 2 Review Ethics Security BP6 3,4...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Test 2 Review Ethics & Security BP6: 3,4 Provide an example of each of the three primary security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response 1. ID and password, card or token, fingerprint or voice signature a. Smart card = student id card for meals b. Token = changes user passwords automatically on the spot 2. Content filtering, Encryption, Firewalls a. Email filter for spam b. Public encryption key (PKE) = encryption system that uses a public key for everyone and a private key that only individuals receive, send info using public and open using private c. Firewall = hardware or software that guards a network by analyzing info leaving and entering 3. Antivirus software is most common Describe the relationships and differences between hackers and viruses Hackers= people Viruses= malicious software Viruses are made by hackers, but not all hackers make viruses. BP7: What are the six e- policies? Give a quick description of each. Ethical computer use o General principles to guide computer behavior o Ex: users should refrain from playing games during work o Users should be informed and then should consent Information privacy o General principles regarding info privacy o Responsibility for adoption and implementation of privacy policy o Notice and disclosure of what/who is affected o Choice and consent, at least be able to opt out
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
of certain things o Information security o Information quality and access, corruption prevention Acceptable use (AUP) o User must agree to follow in order to be provided access to a network or internet o Nonrepudiation: contractual stipulation to ensure that e-business participants do not deny their online actions o Ex: don’t violate law Don’t break security No commercial msgs w/o permission Dont deny activity No spam No electronic mail bombing Email privacy o Details extent in which email can be read by others o Follow other policy o Have to be legit email user o Backup procedure o Reasons for needing to read others email o Org no control over email at certain point, outside o Future relations if gone o Making info available to others by accident Internet use o Similar to email o Proper use of internet o Available internet services o What purpose of internet should be o Ethical policy o consequences Anti-spam o Email users will not send spam o PPT: EthicsSecurity.ppt
Image of page 2
Supply Chain Management B10: 1,2 List and describe the components of a typical supply chain. Supplier: Upstream o Provides raw material Manufacturer o Refines raw material into product Distributor o Provides product to vendor Retailer o Provides product to consumer Customer: Downstream o Receives product Define the relationship between decision making and supply chain management.
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern