Kenneth C. Laudon,Jane P. Laudon Management Information System 12th Edition pdf



Download 15,21 Mb.
Pdf ko'rish
bet10/645
Sana20.01.2022
Hajmi15,21 Mb.
#393158
1   ...   6   7   8   9   10   11   12   13   ...   645
Bog'liq
Kenneth C. Laudon ( PDFDrive ) (1)

Learning Track Modules:

Computing and Communications Services Provided by

Commercial Communications Vendors; Broadband Network Services and

Technologies; Cellular System Generations; Wireless Applications for CRM, SCM,

and Healthcare; Web 2.0  283

Review 


Summary  284 • Key Terms  285 • Review Questions  286 • Discussion 

Questions  286 • Video Cases  286 • Collaboration and Teamwork: Evaluating

Smartphones  286

Case Study:



Google, Apple, and Microsoft Struggle for Your Internet 

Experience  287

Chapter 8

Securing Information Systems  290

Opening Case:



You’re On Facebook? Watch Out!  291

8.1


System Vulnerability and Abuse  293

Why Systems Are Vulnerable  293 • Malicious Software: Viruses, Worms,

Trojan Horses, and Spyware  296 • Hackers and Computer Crime  298 •

Internal Threats: Employees  302 • Software Vulnerability  303

Interactive Session: Management



When Antivirus Software Cripples Your

Computers  304

8.2

Business Value of Security and Control  305



Legal and Regulatory Requirements for Electronic Records 

Management  306 • Electronic Evidence and Computer Forensics  307

8.3

Establishing a Framework for Security and Control  308



Information Systems Controls  308 • Risk Assessment  309 • Security Policy

310 • Disaster Recovery Planning and Business Continuity Planning  310 •

The Role of Auditing  312

8.4


Technologies and Tools for Protecting Information Resources  312

Identity Management and Authentication  312 • Firewalls, Intrusion

Detection Systems, and Antivirus Software  314 • Securing Wireless

Networks  316 • Encryption and Public Key Infrastructure  317 • Ensuring

System Availability  318 • Security Issues for Cloud Computing and the

Mobile Digital Platform  320 • Ensuring Software Quality  320

Interactive Session: Technology 



How Secure Is the Cloud?  321

8.5


Hands-on MIS Projects  323

Management Decision Problems  323 • Improving Decision Making: Using

Spreadsheet Software to Perform a Security Risk Assessment  324 •

Improving Decision Making: Evaluating Security Outsourcing Services  325




Download 15,21 Mb.

Do'stlaringiz bilan baham:
1   ...   6   7   8   9   10   11   12   13   ...   645




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish