Chapter 5

CyberSecurity, Compliance, and Business Continuity

Quick Look

Case 1, Opening Case: Managing BYOD Security Risks

5.1 Up Close Look at Cybercrimes, Criminals, and Motivations

5.2 IT Vulnerabilities and Threats

5.3 Defending Against Fraud

5.4 Information Assurance and Risk Management

5.5 Network Security

5.6 Internal Control and Compliance

5.7 Business Continuity and Auditing Key Terms

Chapter 5 Link Library

Evaluate and Expand Your Learning

  • IT and Data Management Decisions
  • Questions for Discussion & Review
  • Online Activities
  • Collaborative Work

Case 2, Business Case: Army Deploys Androids, Securely

Case 3, Video case: Cars, Appliances Could Be Hack Targets

Data Analysis & Decision Making: Financial Impact of Breached Protected Health Information

References

Learning Outcomes

images Describe the types of cybercrimes facing organizations and critical infrastructures, explain the motives of cybercriminals, and evaluate the financial value of cybersecurity.

images Explain both low-tech and high-tech methods used to gain access to a company's networks and databases, the vulnerabilities of information systems, and cybercrime symptoms. Describe the critical role of senior management, acceptable use policies, security procedures, and IT for defense-in-depth.

Describe types and characteristics ...

Get Information Technology for Management: Advancing Sustainable, Profitable Business Growth, 9th edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.