Thursday, April 1, 2010

Chapter Four Questions

1. Explain the ethical issues surrounding information technology.
  • Intellectual property: Rights surrounding the use of someone else's creative and intellectual property.
  • Copyright: Includes songs, videos, software and documents all which are protected by copyright.
  • Fair use doctrine: Involves cases where you can use someone else's material without concern to copyright.
  • Pirated software: The use, duplication, distribution or sale of copyrighted software without authorisation.
  • Counterfeit software: When fake software that is manufactured is sold.

Image from: http://www.contrib.andrew.cmu.edu/~elsaw/



2.
Describe the relationship between an ‘email privacy policy’ and an ‘Internet use policy’.

  • Email privacy policy: How an email system can be used by employees which also outlines to what extent an organisation can read their employees emails.
  • Internet use policy: Guidelines that outline the use of the Internet with a certain organisation. E.g. not looking at inappropriate sites.

3. Summarise the five steps to creating an information security plan

  1. Develop information security policies: Includes things such as never sharing passwords, and changing passwords every 60 days.
  2. Communicate information security policies: Train employees and outline employee expectation.
  3. Identify critical information assets and risks: Ensure the use of user ID's, passwords, antivirus software and firewalls.
  4. Test and re-evaluate risks: Audit and review security plans periodically.
  5. Obtain stakeholder support: Endure top level management and stakeholders are aware of security policies and support them.

4. What do the terms; authentication and authorization mean, how do they differ, provide some examples of each term.

  • Authentication: Used to confirm the identity of users. E.g. User ID, passwords or fingerprints.
  • Authorisation: When someone is given consent do perform or have something.

Image from:

http://www.sflp.co.uk/xhtml-css/index.html


5. What the Five main types of Security Risks, suggest one method to prevent the severity of risk?



No comments:

Post a Comment