Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Seminars in IT for Businesses - Lecture 25: Ethic & information security issues (Part 2). In this chapter, students will be able to understand: Information security, protecting intellectual assets, the first line of defense – people, the second line of defense – technology. | ETHICS & INFORMATION SECURITY ISSUES Part 2 LEARNING OBJECTIVES Ethics Information Ethics Developing Information Management Policies Ethics in the Workplace Information Security Protecting Intellectual Assets The First Line of Defense - People The Second Line of Defense - Technology Introduction Information technology is critical to business and society Computer security is evolving into information security Information security is the responsibility of every member of an organization, but managers play a critical role Introduction Information technology is the vehicle that stores and transports information from one business unit to another. But what happens if the vehicle breaks down, even for a little while? As businesses have become more fluid, the concept of computer security has been replaced by the concept of information security. Because this new concept covers a broader range of issues, from the protection of data to the protection of human resources, information security is no longer the sole responsibility of a discrete group of people in the company; rather, it is the responsibility of every employee, and especially managers. Introduction Information security involves three distinct communities of interest: Information security managers and professionals Information technology managers and professionals Non-technical business managers and professionals Introduction Organizations must realize that information security decisions should involve three distinct groups of decision makers, or communities of interest: Information security managers and professionals Information technology managers and professionals Non-technical business managers and professionals Organizations must realize that information security decisions should involve three distinct groups of decision makers, or communities of interest: Information security managers and professionals Information technology managers and professionals Non-technical business managers and . | ETHICS & INFORMATION SECURITY ISSUES Part 2 LEARNING OBJECTIVES Ethics Information Ethics Developing Information Management Policies Ethics in the Workplace Information Security Protecting Intellectual Assets The First Line of Defense - People The Second Line of Defense - Technology Introduction Information technology is critical to business and society Computer security is evolving into information security Information security is the responsibility of every member of an organization, but managers play a critical role Introduction Information technology is the vehicle that stores and transports information from one business unit to another. But what happens if the vehicle breaks down, even for a little while? As businesses have become more fluid, the concept of computer security has been replaced by the concept of information security. Because this new concept covers a broader range of issues, from the protection of data to the protection of human resources, information .