Chapter 5
CyberSecurity, Compliance, and Business Continuity
Quick Look
Case 1, Opening Case: Managing BYOD Security Risks
5.1 Up Close Look at Cybercrimes, Criminals, and Motivations
5.2 IT Vulnerabilities and Threats
5.3 Defending Against Fraud
5.4 Information Assurance and Risk Management
5.5 Network Security
5.6 Internal Control and Compliance
5.7 Business Continuity and Auditing Key Terms
Chapter 5 Link Library
Evaluate and Expand Your Learning
- IT and Data Management Decisions
- Questions for Discussion & Review
- Online Activities
- Collaborative Work
Case 2, Business Case: Army Deploys Androids, Securely
Case 3, Video case: Cars, Appliances Could Be Hack Targets
Data Analysis & Decision Making: Financial Impact of Breached Protected Health Information
References
Learning Outcomes
Describe the types of cybercrimes facing organizations and critical infrastructures, explain the motives of cybercriminals, and evaluate the financial value of cybersecurity.
Explain both low-tech and high-tech methods used to gain access to a company's networks and databases, the vulnerabilities of information systems, and cybercrime symptoms. Describe the critical role of senior management, acceptable use policies, security procedures, and IT for defense-in-depth.
Describe types and characteristics ...
Get Information Technology for Management: Advancing Sustainable, Profitable Business Growth, 9th edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.