Essentials of Information Technology Chapter 8 Review

In: Computers and Technology

Submitted By AdrianBarber
Words 662
Pages 3
Adrian Barber
ITM 100
Chapter 8
Digital convergence is the use of a single device to handle media, internet, entertainment, and telephony needs. Smart phones are an example of digital convergence because they let you do anything a computer a can do. The Padfone is a combination of the features of a phone and a tablet into one device. Some refrigerators include LCD touch screen displays and network adapters so they can play music and display family photos and recipes. The Digitial Living Network Alliance is an organization that works to standardize different kinds of appliances and network devices used in our homes. Mobile devices have evolved and are now able to do multiple tasks at once. Smart phones can video conference like laptops. Tablets are touch screen sensitive like smart phones. Notebooks and ultra-books can run traditional operating systems and they are lightweight. Devices have a significant overlap in the tasks they can perform, so it's important to learn the difference so you can decide what technology matches your needs.
Telephony is the use of equipment to provide voice communications over a distance. A smart phone performs many tasks here is just a few: Access to the internet, voice recording features, the ability to play and organize music files, GPS services and digital image and video capture. Cellular phones refer to all phones that use mobile, cellular technology. Many cell phones are considered smartphones but less powerful cell phone are available. Feature phones are inexpensive phones that have modest processors, simpler interfaces, and often no touch screen. Feature phones and smartphons have components as any computer: a processor, memory, and input output devices. Smartphones use a CPU and interface so powerful that they can perform the same tasks as much more expensive computers like: videoconfering, recording and editing HD video…...

Similar Documents

Information Technology

...rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 70 CHAPTER 3 1. Describe the major ethical issues related to information technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000......

Words: 25389 - Pages: 102

Essentials of Management Information Systems

...Securing Information Systems LEARNING OBJECTIVES C H A P T E R 7 STUDENT LEARNING OBJECTIVES After completing this chapter, you will be able to answer the following questions: 1. Why are information systems vulnerable to destruction, error, and abuse? What is the business value of security and control? What are the components of an organizational framework for security and control? What are the most important tools and technologies for safeguarding information resources? 2. 3. 4. ISBN 1-256-42913-9 232 Essentials of MIS, Ninth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2011 by Pearson Education, Inc. C HAPTER O UTLINE Chapter-Opening Case: Boston Celtics Score Big Points Against Spyware 7.1 System Vulnerability and Abuse 7.2 Business Value of Security and Control 7.3 Establishing a Framework for Security and Control 7.4 Technologies and Tools for Protecting Information Resources 7.5 Hands-on MIS Projects Business Problem-Solving Case: Are We Ready for Cyberwarfare? BOSTON CELTICS SCORE BIG POINTS AGAINST SPYWARE While the Boston Celtics were fighting for a spot in the playoffs several years ago, another fierce battle was being waged by its information systems. Jay Wessel, the team’s vice president of technology, was trying to score points against computer spyware. Wessel and his IT staff manage about 100 laptops issued to coaches and scouts, and sales, marketing, and finance employees, and......

Words: 21009 - Pages: 85

Pricinples of Information Security, Chapter 5 Review Questions

...organization s information assets begins by creating or validating an existing security blueprint for the implementation of needed security controls to protect the information assets.  A framework is the outline from which a more detailed blueprint evolves.  The blueprint is the basis for the design, selection, and implementation of all subsequent security policies, education and training programs, and technologies.  The blueprint provides scaleable, upgradeable, and comprehensive security for the coming years.  The blueprint is used to plan the tasks to be accomplished and the order in which to proceed. What is information security governance? Governance is “the set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterprise’s resources are used responsibly.”1 Governance describes the entire process of governing, or controlling, the processes used by a group to accomplish some objective. Just like governments, corporations and other organizations have guiding documents—corporate charters or partnership agreements—as well as appointed or elected leaders or officers, and planning and operating procedures. These elements in combination provide corporate governance. Each operating unit within an organization also has controlling customs, processes, committees, and practices. The......

Words: 4589 - Pages: 19

Chapter 8 Review

...relationship between risks threats and vulnerabilities as it pertains to information system ... it 255 lab 2 solution - StudentOfFortune.com www.studentoffortune.com/question/2289555/it-255-lab-2-solution What is the relationship between risks, threats, and vulnerabilities as it pertains to information systems ... vulnerability, exploits, and the risk ... Understanding risk, threat, and vulnerability | TechRepublic www.techrepublic.com/blog/...risk-threat-and-vulnerability/1897 The three security terms “risk”, “threat”, and “vulnerability” will be defined and differentiated here: Risk. SANS Institute InfoSec Reading Room - SANS Information, … www.sans.org/.../introduction-information-system-risk-management_1204 · PDF file 4.2.3 Relating Threats to Vulnerabilities ... Once again, NIST SP 800-30 provides an excellent de finition of vulnerability as it pertains to information systems. Difference Between Threat & Vulnerability | eHow.com www.ehow.com › … › Operating Systems › Other Operating Systems A vulnerability is a weakness or flaw found in software and operating systems that threats try to exploit. Threats are malicious files or programs that attack an ... Securing Windows 2000 Server - Resources and Tools for IT ... technet.microsoft.com/en-us/library/cc751212.aspx Nov 17, 2004 · A threat is any potential danger to information or the computer systems in your environment. ... The......

Words: 527 - Pages: 3

Principles of Information Security Chapter 3 Review

...Chapter 3 Review 1. What is the difference between law and ethics? The difference between law and ethics is that law is a set of rules and regulations that are universal and should be accepted and followed by society and organizations. Ethics on the other hand was derived from the latin word mores and Greek word Ethos means the beliefs and customs that help shape the character of individuals and how people interact with one another 2. What is civil law, and what does it accomplish? A wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organisational and entities and people. 3. What are the primary examples of public law? Criminal, administrative and constitutional law. 4. Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change? The National Information Infrastructure Protection of 1996 amended the Computer Fraud and Abuse Act of 1986. It modified several sections of the CFA Act, and increased the penalties for selected crime. 5. Which law was specifically created to deal with encryption policy in the United States? The Security and Freedom through Encryption Act of 1999. 6. What is privacy in an information security context? Privacy is not absolute freedom from observation, but rather it is a more precise “State of being free from unsanctioned intrusion”. 7. What is another name for the Kennedy-Kassebaum Act(1996), and why is it important to organisations......

Words: 1285 - Pages: 6

Chapter 6: Review Questions Solutions ( Accounting Information Systems)

...ACCT 305 Accounting Information Systems Chapter 6 Review Questions 1. Several Unique problems and risks associated with computerized information networks are unauthorized access, use, disclosure, disruption, modification, or destruction 2. Elements included in an ISMS system such as hardware, databases, procedures, and reports. 3. Development of ISMS requires application of the life cycle approach for system maintenance purposes. 4. Risk Management is the identification, assessment, and prioritization of risks. 5. Quantitative Approach - each loss exposure is computed as the product of the cost of an individual loss times the likelihood of its occurrence. Qualitative Approach – lists out the system’s vulnerabilities and threats and subjectively ranks them in order of their contribution to the company’s total loss exposures. 6. Types of threats that affect information systems a) Active threats include information systems fraud and computer sabotage. b) Passive threats include system faults, as well as natural disasters (e.g., earthquakes, floods, fires, and hurricanes). 7. Characteristics of white-collar criminal 8. Types of individuals pose a threat to an information system a) Computer and information systems personnel: are often given a wide range of access privileges to sensitive data and programs. b) Users: are given narrow access, but can still find ways to commit fraud. c) Intruders and attackers:......

Words: 714 - Pages: 3

Principles of Information Security Chapter 2 Review Questions

...implementing information security to protect the ability of the organization to function. They must set policy and operate the organization in a manner that complies with the laws that govern the use of technology. Technology alone cannot solve information security issues. Management must make policy choices and enforce those policies to protect the value of the organization’s data. 2. Data is important to an organization because without it an organization will lose its record of transactions and/or its ability to furnish valuable deliverables to its customers. Other assets that require protection include the ability of the organization to function, the safe operation of applications, and technology assets. 3. Both general management and IT management are responsible for implementing information security. 4. The implementation of networking technology has created more risk for businesses that use information technology because business networks are now connected to the internet and other networks external to the organization. This has made it easier for people to gain unauthorized access to the organization’s networks. 5. Information extortion is when an attacker steals information from a computer system and demands compensation for its return or for an agreement not to disclose it. One example could be someone that gains access to PII such as SSN’s through a company’s database and ransoms the information for money. If not paid, he could sell the information on the......

Words: 1112 - Pages: 5

Review Questions Chapter 8

...Describe how enterprise systems provide value for a business. Enterprise systems enable businesses to achieve operational excellence through increased profitability and sales margin; enterprise systems create an environment in which organizations can monitor their sales demand and predict future sales, applications retrieve vital information and support management in their decision making process. Enterprise Systems are large scale, integrated application software packages that use the computational, data storage, and data transmission power of modern information technology. Enterprise systems are a combination of computer hardware and software that a business uses to organize and run its operations. 2-How do supply chain management systems coordinate planning, production, and logistics with suppliers? • Define a supply chain and identify each of its components. • Explain how supply chain management systems help reduce the bullwhip effect and how they provide value for a business. • Define and compare supply chain planning systems and supply chain execution systems. • Describe the challenges of global supply chains and how Internet technology can help companies manage them better. • Distinguish between a push-based and a pull-based model of supply chain management and explain how contemporary supply chain management systems facilitate a pull-based model. Supply chain refers to a group of organizations and business processes for procuring materials, transforming......

Words: 948 - Pages: 4

Chapter 2 Review Questions Principles of Information Security

...1. Information security is more of a management issue because it is up to management to decide what end users should have access to and what they should not. Also technology can only do what it is told to do but if management sets up training to teach end users about the threats of say opening an unknown email then the company is safer. 2. Without data an organization loses its record of transactions and/or its ability to deliver value to its customers. Page 42 Principles of Information Security 3. Both general and It management 4. It has created more and the reason why is it is much easier to spread viruses, worms, etc. now that the can get from system to system without having to attach to a physical disc. 5. Information extortion occurs when an attacker or trusted insider steals information from a computer system and demands compensation for its return or for an agreement not to disclose it. Page 60 Principles of Information Security. An example would be if someone would steal the latest album from a well-known artist before its release date and demanded to be paid or it would be released onto the internet. 6. Employees are one of the biggest threats for several reasons the can accidently allow someone access to the system by installing a back door or it is possible for them to become angry with the company and just hand out IP to rival companies. It is also possible that they could accidently delete valuable data from the system that has no backup. 7. Make sure......

Words: 908 - Pages: 4

Information Technology Career Review

...Portfolio Project Professional Plan Bryant & Stratton College Southtowns Campus James Armstrong Network Security Mrs. Sedor March 19, 2014 This paper examines different aspects of the Information Technology field and related career paths. Certain aspects of the IT field were researched and explored in an attempt to learn more about the job market and the IT field. The categories that were explored in each job title were; pay scale, industry growth rate, responsibilities as well as educational background and training. Also examined was the possible over saturation of the job market by qualified but untested applicants in a seriously competitive market. (the number of students expected to graduate versus the projected job market). Information Technology Network Security is an ever changing, growing field of study. One cannot get involved in the careers it encompasses without having a basic love of learning, even on a subconscious level. New technology is constantly being developed and so anyone in the IT field must continually be retrained, for lack of a better term. This holds true even more so for the software side of the field. Consider the firewall or antivirus software, every time the computer system is turned on the system checks for updates to its library of known viruses. That means somewhere on the other end of the internet connection is a network security technician who is constantly researching and investigating new......

Words: 793 - Pages: 4

Chapter 8 Review Question

...1. How does resource scheduling tie to project priority? a. Resource scheduling is directly tied to the project priority when the priority system selects projects that best contribute to the organizations objectives, within the constraints of the resources available. “If all projects and their respective resources are computer scheduled, the feasibility and impact of adding a new project to those in process can be quickly assessed. With this information the project priority team will add a new project only if resources are available to be formally committed to that specific project” (pg 251). It is paramount that scheduling resources are realistic judgments of resources availability and project durations. For example at my current job, the committee and I are planning a big event that’s sponsored by Macy’s. Before we can go to Macy’s with the project priority, as a committee we had to do the resource schedule such as the cost of everything we wanted to do and our project budget. Reference Larson, E. W., & Gray, C. F. (2014). Project management (6th ed.). Retrieved from The University of Phoenix eBook Collection database 2. How does resource scheduling reduce flexibility in managing projects? For resource-constrained projects, resource scheduling (leveling) reduces flexibility because (after leveling) slack is reduced and the amount of critical/near-critical activities increases; therefore, the number of CP’s may also increase. Further, scheduling complexity......

Words: 642 - Pages: 3

Pricinples of Information Security, Chapter 3 Review Questions

...Week 2, Chapter 3 Name: ------------------------------------------------- Review Questions p. 114 Assignment 3          1. What is the difference between law and ethics? Laws are formally adopted rules for acceptable behavior in modern society. Ethics are socially acceptable behaviors. The key difference between laws and ethics is that laws carry the authority of a governing body, and ethics do not. Ethics in turn are based on cultural mores: the fixed moral attitudes or customs of a particular group. Some ethical standards are universal. For example, murder, theft, assault, and arson are actions that deviate from ethical and legal codes throughout the world. 2. What is civil law, and what does it accomplish? Civil law comprises a wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organizational entities and people. 3. What are the primary examples of public law? criminal, administrative, and constitutional law 4. Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change? the National Information Infrastructure Protection Act of 1996, which modified several sections of the amended the Computer Fraud and Abuse Act of 1986 and increased the penalties for selected crimes. The punishment for offenses prosecuted under this statute varies from fines to imprisonment up to 20 years, or both. The severity of the penalty depends on the value of the information obtained and...

Words: 1517 - Pages: 7

Information Technology

...CHAPTER 1 Introduction In this chapter will introduce Online Training & Tracking System mainly talks about these points background of the study, problem statement, research questions, purpose of the study, research objectives, scope of study and significant of the study we’ll cover Trainingis the process from which employees acquire the capabilities to perform their jobs and is an essential part of any successful business. 1.1 Background of the study Online Employee training & tracking management System (OETTMS) is website developed for employee training in universities, colleges and institutes. The term training refers to the acquisition of knowledge, skills, and competencies as a result of the practical skills and knowledge that relate to specific useful competencies (Admiraal and Lockhorst, 2009). In addition to the basic training required for a trade, occupation orprofession, observers of the training recognize today the need to continue training to maintain, upgrade and update skills throughout working life (ASTD, 2010). People within many professions and occupations may refer to this sort of training as professional development. Training or course is an external activity of any company. It is an activity to train, improve knowledge and skill for their staff. To arrange training, it need goodManagement which the training had attended will be useable to the employee (Schuster, 2011). A core factor search is employees who will attend......

Words: 957 - Pages: 4

Information Technology

...Information Technology Strategic Plan Wahidah Muhammad Strayer University Dr. Richard Brown March 14, 2016 Information Technology Strategic Plan Blizzard Entertainment, Inc. is an American video game developer and publisher company based in Irvine, California. Founded in 1991, by three University of California, Los Angeles graduate’s students, Michael Morthaime, Frank Dearce and Allen Adham, under the name Silicon & Synapse. Before 1993, the company primarily focused on creating game ports, a connector for video game input devices, for other studios. After being acquired by Davidson & Associates, a distributor company, in 1994, the company became known as Chaos Studios and shortly after Blizzard Entertainment, Inc. Blizzard’s mission is dedicated to creating the most epic entertainment experiences…ever (us.blizzard.com.). With eight core values that represent the principles and beliefs, has shaped this company throughout the years. Their goal is to make every game as fun as possible for as many people they can reach. To improve the quality of the gaming experience, Blizzard Entertainment seeks honest feedback from gamers. Understanding that first and lasting impressions are everything in the gaming industry, the company strives to maintain a high level of respect and integrity in all interactions with players, colleagues, and business partners. Everyone has a little geek in them. With cutting edge technology, comic books,......

Words: 2423 - Pages: 10

Management Information Technology Literature Review

...Running head: ETHICAL BEHAVIOR AND THE WORKPLACE How Businesses Are Using Technology to Enforce Ethical Behavior in the Workplace: Jonathan R. Jordan Liberty University Abstract Many companies and organizations are finding enviable growth and expansion only by delving into new markets. To accomplish this, companies must seize the advantage of utilizing the latest and most effective technology. With the rapid advancement of technology, the importance of business ethics has increased immensely. Ethics has always been an important subject as long as companies and organizations have been conducting business. However, this rapid technological advancement has and will have a tremendous impact on business ethics. This literature review will explain how businesses are using technology to enforce ethics in the workplace. It will discuss how the progression of technology is forcing businesses and organizations to approach their operations from an ethical perspective. It will explain the importance of business ethics, and will provide research concerning what has been accomplished to utilize technology in enforcing business ethics. Ethics The concept of ethics involves deciding what kind of work life businesses and companies should seek for their employees (Audi, 2009). Morality, honesty, and integrity, are ethical concerns that are seemingly deficient in modern society. However, the concept of ethics reaches further into the fiber of corporations and......

Words: 6959 - Pages: 28

武侠世界轮回者 | 下载 APK | Scooby Doo, wo bist du?