IT has eliminated monotonous or obnoxious tasks However some skilled

It has eliminated monotonous or obnoxious tasks

This preview shows page 66 - 70 out of 86 pages.

IT has eliminated monotonous or obnoxious tasks However, some skilled craftsperson jobs have been replaced by jobs requiring routine, repetitive tasks or standby roles Individuality Dehumanizes and depersonalizes activities because computers eliminate human relationships Inflexible systems CHAPTER SECURITY AND ETHICAL CHALLENGES (ONLY 9 SLIDES FILE) Cyberlaw Laws intended to regulate activities over the Internet or via electronic communication devices Encompasses a wide variety of legal and political issues Includes intellectual property, privacy, freedom of expression, and jurisdiction The intersection of technology and the law is controversial Some feel the Internet should not be regulated Encryption and cryptography make traditional form of regulation difficult The Internet treats censorship as damage and simply routes around it Cyberlaw only began to emerge in 1996 Debate continues regarding the applicability of legal principles derived from issues that had nothing to do with cyberspace Cryptographic Cryptography involves creating written or generated codes that allow information to be kept secret. Cryptography is the science of using mathematics to encrypt and decrypt data. Information security uses cryptography on several levels. The information cannot be read without a key to decrypt it. The information maintains its integrity during transit and while being
Image of page 66
stored. Cryptography also aids in nonrepudiation. This means that the sender and the delivery of a message can be verified. Cryptography There are five primary functions of cryptography: Authentication Integrity Confidentiality Non-Repudiation Availability Cryptographic Keys Cryptographic keys i.e. binary digits Types of Cryptographic keys Symmetric Asymmetric Static vs ephemeral keys Key length and algorithms Factors for Key length The algorithm being used The strength of security required The amount of data being processed with the key The crypto-period of the key Common functions for cryptographic keys
Image of page 67
Cryptographic keys are used for a number of different functions, such as those listed below. The properties of the associated key (e.g. type, length, crypto-period) will depend on its intended function. Data Encryption Key Authentication Key Digital Signature Key Key Encryption Key Master Key Root Key Blockchain Blockchain is a distributed, tampered proof digital ledger. It is a record of transactions like in accounting ledger. Decentralized system Applications : Bitcoin Digital certificates Blockchain- How it works In blockchain the data is gathered and stored into block and then chain together using cryptography, the process includes Recording transaction Transaction combined with other transactions into a block Timestamped transaction in sequential manner Blocks are chained together Hash – cryptographic technique is used to secure the block
Image of page 68
Business Applications of Blockchain Smart contracts Governance Warranty or Insurance claims Internet of things Land Title Management Healthcare Use CHAPTER 11: MIS What is the Role of Knowledge Management Systems in Business?
Image of page 69
Image of page 70

You've reached the end of your free preview.

Want to read all 86 pages?

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes