See also
information systems security
information systems department, 68–69, 73,
488, 489–524
information systems literacy, 18
information systems managers, 68
information systems plan, 532, 533
information systems projects.
See
business
process redesign; project management;
systems design
information systems security, 68–69, 291–326
access control, 310
antivirus and antispyware software, 316,
326
biometric authentication, 313–314, 326
business continuity planning, 311–312
business value of, 305–306, 326
cloud computing, 320, 321
computer forensics, 307
data security, 317–318, 326
denial-of-service (DoS) attacks, 299
disaster recovery planning, 310–312
distributed denial-of-service (DDoS)
attacks, 299, 329
electronic evidence, 307
electronic records management, 9,
306–307, 522–524
encryption, 317–318, 326
firewalls, 185, 314–315, 326
global threats, 302
hackers, 295, 296, 298, 330
identity management and authentication,
312–314
identity theft, 301–302
information systems controls, 308
internal threats from employees, 302–303
intrusion detection systems, 316, 326
legislation, 301–302
MIS audit, 312, 326
outsourcing, 8, 11, 192, 201, 319
public key encryption, 317–318
public key infrastructure, 326
risk assessment, 309, 326, 539–540, 553
security policy, 310, 326
smart card, 313, 326
technologies and tools for protecting
information resources, 312–320, 326
threats and vulnerability, 293–303, 323
tokens, 313, 326
unified threat management (UTM)
systems, 316
for wireless networks, 295–296, 316–317
See also
cybercrime; Internet security
threats
information technology (IT)
aligning with business objectives, 111–112,
530–531, 553
autonomic computing, 185
behavioral impact, 93
capital investment, 5, 553
defined, 15, 20
economic impacts, 89–91
organizational change and, 489–490
organizational impact, 91–92
organizations and, 81
standards, 174–175
information technology (IT) infrastructure, 21,
22, 164, 165
capacity planning, 194
cloud computing, 6, 7, 167, 170
competitive forces model, 95–96, 102, 109,
115, 196–197
components, 165–167, 175–181, 200
computer hardware platforms, 175–177,
181
consulting and system integration
services, 181
data management and storage, 20, 166,
176, 179–180
declining communication costs and,
173–174, 200
defining, 165–166
enterprise software applications, 176, 177,
338–339
evolution of, 166–170, 200
global systems, 556–587
hardware platforms, 181–187
Internet platforms, 176, 180
investment in, 5, 195–197, 201, 553
law of mass digital storage, 171–172, 200
legacy systems, 167, 181, 182, 191
I 10
Index
management issues, 194–197
Metcalfe's law, 173, 200
mobile platforms, 6, 7, 9, 170
Moore's law, 170–171, 200
networking/telecommunications
platforms, 176, 180
operating system platforms, 176, 177
rent vs. buy decision, 195
scalability, 194
"service platform" perspective, 166
total cost of ownership (TCO), 195–196,
201, 538
Web services, 189–190, 200–201
Do'stlaringiz bilan baham: |