100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MIS 200 Final Exam (1) $7.99   Add to cart

Exam (elaborations)

MIS 200 Final Exam (1)

 2 views  0 purchase
  • Course
  • Institution

MIS 200 Final Exam (1)

Preview 2 out of 6  pages

  • July 18, 2024
  • 6
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
MIS 200 Final Exam
6 ethical policies organizations should implement to protect themselves - ANS-1. Ethical
computer use policy
2. Information privacy policy,
3. Acceptable use policy (AUP)
4.Email privacy policy
5.Social media policy
6. Employee monitoring policy

Ethical computer use policy - ANS-Contains general principles to guide computer use behavior.
EX:Don't play solitaire at work dummy.

Information privacy policy - ANS-Contains general principles regarding information privacy

Acceptable use policy (AUP) - ANS-A document stipulating constraints and practices that a user
must agree to for access to a corporate network or the Internet.

Email privacy policy - ANS-Details the extent to which email messages may be read by others

Social media policy - ANS-A corporate code of conduct that provides guidelines for employees
who post content on the Internet either as part of their job or as a private person.

Employee monitoring policy - ANS-Explicitly state how, when, and where the company monitors
its employees

Hacker - ANS-Experts in tech who use their knowledge to break into computers and computer
networks either for profit or challenge

Virus - ANS-Software written with malicious intent to cause annoyance or damage.

Information Security Policies - ANS-Identifies the rules required to maintain information security,
such as requiring users to log off before leaving for lunch or meetings, never sharing passwords
with anyone, and changing passwords every 30 days

Information security plan - ANS-Details how an organization will implement the information
security policies.

Three primary information security areas - ANS-1.authentication and authorization
2.prevention and resistance
3.detection and response

, Authentication and authorization - ANS-Authentication is a method for confirming users'
identities.
Authorization is the process of providing a user with permission including access levels and
abilities such as file access, hours of access, and amount of allocated storage space

Example of authentication and authorization - ANS-Authentication- Employees in a company
are required to authenticate through the network before accessing their company email
Authorization- After an employee successfully authenticates, the system determines what
information the employees are allowed to access

Prevention and resistance - ANS-content filtering: watch what's coming in and going out
encryption: go over a public space, scramble data so that when it reaches point B it can be put
back into its original form
firewalls: put in-between inside and outside to guard against info

Examples of prevention and resistance - ANS-In a security branch, a thief is then unable to read
encrypted information. A firewall is hardware and/or software that guard a private network by
analyzing incoming and outgoing information for the correct markings.

Detection and response - ANS-Intrusion detection software (IDS) features full time monitoring
tools that search for patterns in network traffic to identify intruders

Examples of detection and response - ANS-quarantining malware, phishing awareness training,
and patching known vulnerabilities with system updates.

Ethics - ANS-the principles of right and wrong that guide an individual in making decisions

Why are ethics important to a company? - ANS-The ethical issues surrounding copyright
infringement and the violation of IP rights are consuming the ebusiness world.

Information management - ANS-Examines the organizational resource of information and
regulates its definitions, uses, value, and distribution ensuring it has the types of
data/information required to function and grow effectively.

Information governance - ANS-A method or system of government for information management
or control.

Information compliance - ANS-The act of conforming, acquiescing, or yielding information.

Privacy - ANS-The right to be left alone when you want to be, to have control over your personal
possessions, and not to be observed without your consent.

Confidentiality - ANS-The assurance that messages and information remain available only to
those authorized to view them.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller lydiaomutho. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart