ITM_309_Exam_Two_Review - ITM 309 Fall, 2011 Exam Two...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Exam Two Topics: Review Outline - November 2, 2011 Ethics and Information Security – Chapter 4 Business Ethics : Ethics – The principles and standards that guide our behavior toward other people. Information ethics – Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself. Honor Code : Professional Values and Standards (Integrity, Respect, Continuous Improvement) & Code Violations BW: Ethics 101 for Interns : 1) Take personal responsibility for integrity 2) Practice good records management 3) Privacy, intellectual property and security (Don’t take confidential info out with you where it could be lost) 4) Intern nights and working conditions (No inappropriate email) 5) Consumer protection (Don’t use unapproved material) 6) Health, safety & environmental protection Information Ethics : Intellectual property : intangible creative work that is embodied in physical form and includes copyrights, trademarks and patents Copyright : the legal protection afforded an expression of an idea Pirated software : unauthorized uses, duplication, distribution, or sale of copyrighted software. Counterfeit software : software that is manufactured to look like the real things and sold as such. Information Management Policies : Organizations strive to build a corporate culture based on ethical principles that employees can understand and implement. E-policies : Ethical computer use policy, Information privacy policy, Acceptable use policy, Email privacy policy, Social media policy, Workplace monitoring policy Security Management Planning and Lines of Defense : First line of defense = people. The first line of defense an organization should follow to help combat insider issues is to develop information security policies and an information security plan. The second line of defense = technology. There are three primary information technology security areas 1) People: Authentication and authorization 2) Data: Prevention and resistance 3) Attack: Detection and response Security Measures, Methods, and Tools : firewalls : is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings. Encryption : scrambles information into an alternative form that requires a key or password to decrypt. Primary IT Security Areas
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/21/2011 for the course ITM 309 taught by Professor Rodammer during the Fall '08 term at Michigan State University.

Page1 / 5

ITM_309_Exam_Two_Review - ITM 309 Fall, 2011 Exam Two...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online