Matt Moss BUS 381 Chapter 7 7-26

advertisement
Matt Moss
BUS 381
Chapter 7
7-26-13
1. (10 points) How is the security of a firm's information system and data affected by its
people, organization, and technology? How can a firm's security policies contribute and
relate to the six main business objectives? Give examples.
The security of a firm's information system and data by exposing it to threats such as
people because employees may have access to data not shared on the internet. The
organizations goals could also be a factor because hackers could target them for that
reason alone. Technology may also be a factor, whether or not the organization uses the
most recent tech or old outdated tech that hackers can easily access.
A Firms security policy can contribute to the 6 main business objective by supporting
them.
2. (10 points) Why is software quality important to security? What specific steps can an
organization take to ensure software quality? Hackers and their companion viruses are an
increasing problem, especially on the Internet. What are the most important measurers for
a firm to take to protect itself from this? Is full protection feasible? Why or why not?
If poor software is implemented in an information system, it could possible lead to all
sorts of security vulnerabilities. An organization can ensure software quality by
employing software metrics and rigorous software testing. The most important protection
that a firm can use is Anti-virus and Firewalls. Full protection is not feasible because
vulnerabilities are found daily by hackers.
3. (10 points) Read the case study (How Secure is Your Samrtphone?) on page 249. And
answer the following questions:
o It has been said that a smartphone is “a microcomputer in your hand.” Discuss the
security implications of this statement. What people, organization, and technology
factors must be addressed by smartphone security?
Only certain people within the organization should have their smartphone
connected to the company's network. If they lose the phone, the data could
become compromised. That is why a lock pin or remote-wipe software should be
implemented on all smart phones for a company.
o
What steps can individuals and businesses take to make their smartphones more
secure?
Both individuals and businesses can help secure their smartphones by adding a
pin lock code to all their smartphones.
o
o
Visit two of the following Web sites: Droid Security, F-Secure, Lookout, and
Kaspersky and review their capabilities for mobile device security.
Compare the capabilities of two of these services.
Droid
Security
Preserve privacy
block hackers and scammers
anti-virus
anti-theft
parental controls
o
x
x
x
F-Secure
x
x
x
x
x
What mobile platforms does each support?
Droid security supports only Android. F-Secure supports only Android.
o
What protection does each provide?
Droid Security will provide privacy protection, block hackers and scammers, antivirus. F-secure will provide privacy protection, block hackers and scammers, antivirus, anti-theft features, and parental controlls.
4. (15 points) Improving Decision Making: Using spreadsheet to perform a security risk
assessment
See ch07.xlsx
Download