Preview

Itm 309 Exam 2 Study Guide

Satisfactory Essays
Open Document
Open Document
839 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Itm 309 Exam 2 Study Guide
ITM 309 Spring, 2012
Exam Two Topics: Review Outline - March 21, 2012

Ethics and Information Security – Chapter 4
Business Ethics
BW: Ethics 101 for Interns (Supplemental Reading)
Information Management Policies
• The protection of information from accidental or intentional misuse by persons inside or outside an organization
Security Management Planning and Lines of Defense
• 1st Line of Defense – People o The biggest issue regarding information security is a people issue
• Insiders, Social Engineering, and Dumpster Diving o The first line of defense an organization should follow to help combat insider issues is to develop information security policies and an information security plan
• 2nd Line of Defense – Technology o People: Authentication and Authorization o Data: Prevention and Resistance o Attack: Detection and Response
Security Measures, Methods, and Tools
• Encryption, Firewalls, How are the tools applied
Primary IT Security Areas
• Authentication, Authorization o Authentication – A method for confirming users’ identities o Authorization – The process of giving someone permission to do or have something
• Prevention and Resistance o Content Filtering, Encryption, and Firewalls
• Detection and Response o Intrusion Detection Software – features full-time monitoring tools that search for patterns in network traffic to identify intruders

Infrastructures – Chapter 5
Business Benefits of a Solid MIS Infrastructure
• MIS Infrastructure – includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets. o Supporting Operations (Information) o Supporting Change (Agile) o Supporting Environment (Sustainable)
Moore’s Law
• Refers to the computer chip performance per dollar doubles every 18 months
• Three Primary Side Effects of Businesses Expanding Use of Technology o Increased E-Waste, Energy Consumption, and Carbon Emissions.
• Three Components of a Sustainable MIS Infrastructure:
o

You May Also Find These Documents Helpful

  • Good Essays

    (167) Command issued to upgrade an old version of the Cisco IOS software by downloading a new image from the TFTP server…

    • 469 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Comm 307 Study Guide

    • 1082 Words
    • 5 Pages

    predicts significant relationship or difference, but does not indicate the specific nature of the relationship…

    • 1082 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Soc 324 Study Guide Exam 1

    • 2605 Words
    • 11 Pages

    SOC 324 Exam 1 Review Guide Note: This guide is not meant to be an exhaustive list of everything that is on the exam. It is meant to point you in the right direction. However, anything covered in class or in the readings is fair game…

    • 2605 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    MGA 301 Exam 1 Study Guide

    • 2253 Words
    • 10 Pages

    Conceptual Framework (Constitution for the Profession) - A coherent system of interrelated objectives and fundamentals that can lead to consistent standards and that prescribes the nature, function, and limits of financial accounting and financial statements…

    • 2253 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    To make sure that information is managed appropriately, a number of policies and procedures have to be put in place, concerning security of information.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    ITP 310 Study Guide

    • 638 Words
    • 3 Pages

    Example: Email Programs would need: messages (subject, recipient, sender, time and date, content), contacts, message folders (inbox, outbox, drafts, etc.)…

    • 638 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    PHL 292 - Exam 1 Study Guide

    • 2595 Words
    • 11 Pages

    Thomson argues that a mother and child are (during pregnancy) not “two tenants in a rented house mistakenly rented to both” but rather the mother owns the house. The purpose of this analogy is to reveal that other parties cannot claim to be impartial when they claim they cannot decide who of the two (mother/child) should live.…

    • 2595 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 9 Final Paper

    • 1645 Words
    • 7 Pages

    Management information system (MIS) provides information which is needed to manage organizations efficiently and effectively and the interface between information technology and people ( 4).…

    • 1645 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    MGT 311 Study Guide

    • 907 Words
    • 4 Pages

    In Week One, you are introduced to organizational behavior (OB) as a discipline. You also learn about a number of individual characteristics of employees, and you review both the effects those characteristics have on organizational performance as well as management methods that best align with those characteristics. You will address specific employee characteristics, including attitudes and job satisfaction, emotions and moods, personality and values, and perception and individual decision making.…

    • 907 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In my opinion, no, it doesn’t. Both people are in the wrong in some ways, but Washington seems to have more of a right. He tried to bring peace and didn’t really like killing. Mohammed said killing was life and that you have to.…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Should the Gray wolf be taken off the endangered species list and should they be allowed to be hunted like the common coyote? Scientific evidence does not suggest that wolves should be hunted in Michigan. Moreover, every reason that has been offered for why we should allow wolf hunting is misguided. They are hunted in areas where they have become highly populated for example in areas such as Montana and Idaho because their numbers have increased over 5000 they are killing off the deer and elk population. By controlling the wolf inhabitants it would insure that the wolf does not starve because they ate all their prey.…

    • 539 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    To combat against the threat the security Director/manager must have a good security and risk plan. Michael Blyth (2008) describe that a…

    • 1509 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Quiz 9

    • 445 Words
    • 2 Pages

    ____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.…

    • 445 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Punishment Research Paper

    • 1270 Words
    • 6 Pages

    * Workman, Michael, and John Gathegi. “Punishment and ethics detterents: A study of insider security contravention; Journal Of The American Society For Information Science and Technology, 58, 2, pp.…

    • 1270 Words
    • 6 Pages
    Better Essays