IT has eliminated monotonous or obnoxious tasksHowever, some skilled craftsperson jobs have been replaced by jobs requiring routine, repetitive tasks or standby rolesIndividualityDehumanizes and depersonalizes activities because computers eliminate human relationshipsInflexible systemsCHAPTER SECURITY AND ETHICAL CHALLENGES (ONLY 9 SLIDES FILE)CyberlawLaws intended to regulate activities over the Internet or via electronic communication devicesEncompasses a wide variety of legal and political issuesIncludes intellectual property, privacy, freedom of expression, and jurisdictionThe intersection of technology and the law is controversialSome feel the Internet should not be regulatedEncryption and cryptography make traditional form of regulation difficultThe Internet treats censorship as damage and simply routes around itCyberlaw only began to emerge in 1996Debate continues regarding the applicability of legal principles derived from issues that had nothing to do with cyberspaceCryptographicCryptography involves creating written or generated codes that allow information to be kept secret.Cryptography is the science of using mathematics to encrypt and decrypt data.Information security uses cryptography on several levels. The information cannot be read without a key to decrypt it. The information maintains its integrity during transit and while being
stored. Cryptography also aids in nonrepudiation. This means that the sender and the delivery of a message can be verified.CryptographyThere are five primary functions of cryptography:AuthenticationIntegrityConfidentialityNon-RepudiationAvailabilityCryptographic KeysCryptographic keys i.e. binary digitsTypes of Cryptographic keysSymmetricAsymmetricStatic vs ephemeral keysKey length and algorithmsFactors for Key lengthThe algorithm being usedThe strength of security requiredThe amount of data being processed with the keyThe crypto-period of the keyCommon functions for cryptographic keys
Cryptographic keys are used for a number of different functions, such as those listed below. The properties of the associated key (e.g. type, length, crypto-period) will depend on its intended function. Data Encryption KeyAuthentication KeyDigital Signature KeyKey Encryption KeyMaster KeyRoot KeyBlockchainBlockchain is a distributed, tampered proof digital ledger.It is a record of transactions like in accounting ledger. Decentralized systemApplications :BitcoinDigital certificatesBlockchain- How it worksIn blockchain the data is gathered and stored into block and then chain together using cryptography, the process includesRecording transactionTransaction combined with other transactions into a blockTimestamped transaction in sequential mannerBlocks are chained togetherHash – cryptographic technique is used to secure the block
Business Applications of BlockchainSmart contractsGovernanceWarranty or Insurance claimsInternet of thingsLand Title ManagementHealthcare UseCHAPTER 11: MISWhat is the Role of Knowledge Management Systems in Business?
As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.
KiranTemple University Fox School of Business ‘17, Course Hero Intern
I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.
DanaUniversity of Pennsylvania ‘17, Course Hero Intern
The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.
JillTulane University ‘16, Course Hero Intern
Stuck? We have tutors online 24/7 who can help you get unstuck.
Ask Expert Tutors
You can ask
You can ask
You can ask
(will expire )