Matt Moss BUS 381 Chapter 7 7-26-13 1. (10 points) How is the security of a firm's information system and data affected by its people, organization, and technology? How can a firm's security policies contribute and relate to the six main business objectives? Give examples. The security of a firm's information system and data by exposing it to threats such as people because employees may have access to data not shared on the internet. The organizations goals could also be a factor because hackers could target them for that reason alone. Technology may also be a factor, whether or not the organization uses the most recent tech or old outdated tech that hackers can easily access. A Firms security policy can contribute to the 6 main business objective by supporting them. 2. (10 points) Why is software quality important to security? What specific steps can an organization take to ensure software quality? Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measurers for a firm to take to protect itself from this? Is full protection feasible? Why or why not? If poor software is implemented in an information system, it could possible lead to all sorts of security vulnerabilities. An organization can ensure software quality by employing software metrics and rigorous software testing. The most important protection that a firm can use is Anti-virus and Firewalls. Full protection is not feasible because vulnerabilities are found daily by hackers. 3. (10 points) Read the case study (How Secure is Your Samrtphone?) on page 249. And answer the following questions: o It has been said that a smartphone is “a microcomputer in your hand.” Discuss the security implications of this statement. What people, organization, and technology factors must be addressed by smartphone security? Only certain people within the organization should have their smartphone connected to the company's network. If they lose the phone, the data could become compromised. That is why a lock pin or remote-wipe software should be implemented on all smart phones for a company. o What steps can individuals and businesses take to make their smartphones more secure? Both individuals and businesses can help secure their smartphones by adding a pin lock code to all their smartphones. o o Visit two of the following Web sites: Droid Security, F-Secure, Lookout, and Kaspersky and review their capabilities for mobile device security. Compare the capabilities of two of these services. Droid Security Preserve privacy block hackers and scammers anti-virus anti-theft parental controls o x x x F-Secure x x x x x What mobile platforms does each support? Droid security supports only Android. F-Secure supports only Android. o What protection does each provide? Droid Security will provide privacy protection, block hackers and scammers, antivirus. F-secure will provide privacy protection, block hackers and scammers, antivirus, anti-theft features, and parental controlls. 4. (15 points) Improving Decision Making: Using spreadsheet to perform a security risk assessment See ch07.xlsx