ch12imp
docx
keyboard_arrow_up
School
New Jersey Institute Of Technology *
*We aren’t endorsed by this school
Course
455
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
3
Uploaded by DeaconFlag10435
Implication Chapter 12
Lecture and Reading Implication Name: Paul Wojtowicz
Course: IS455
Date: 2/25/2024
1.
Implication for Chapter 12
a.
Implication(s) of the Lecture and readings for this course i.
The chapter explores the important aspects of information systems security, highlighting the intricacy and requirement of strong security protocols in contemporary enterprises. It lists many kinds of security risks, groups them according to things like computer crime, human mistake, and natural calamities, and talks about how security breaches might result in big losses. Technical precautions like firewalls and encryption, data safeguards like rights and backup plans, and human safeguards like proper personnel and procedural management are all included in this extensive topic. It emphasizes that people and procedures are just as important to security as technology, stressing the
value of training, enforcing rules, and fostering a culture of security inside a company.
ii.
Since it offers a comprehensive overview of the difficulties and solutions involved in information system protection, this chapter is essential reading for both professionals and students. It provides an organized method for identifying and addressing security issues,
bridging the gap between theoretical understanding and real-world implementation. This chapter is essential reading for anybody studying
information systems since it gives readers the skills they need to create
and implement thorough security policies, comprehend the function of different safeguards, and recognize the ongoing nature of information systems security. In a time when information security is crucial to the integrity and profitability of practically every business activity, understanding this subject is critical.
b.
A paragraph on two
topics that were that you consider important and why i.
The textbook's information systems security chapter is very interesting
since it covers encryption and human protections in great detail. A thorough grasp of encryption is necessary for contemporary digital security, as it plays a crucial role in safeguarding data integrity and confidentiality and serving as a vital defense against cyber attacks. Human protections, which address the possibility of inadvertent or deliberate misuse and highlight the necessity of thorough training, strict policy enforcement, and a strong organizational culture of security, are equally critical. When taken as a whole, these subjects highlight the diverse strategy needed for efficient information systems security, combining technology advancements with smart HR practices
to safeguard confidential information and system integrity.
c.
Topic(s) that were confusing - (pick 1 or 2 of them). NOTE: you must include the chapter/page in the reading where the topic can be found. This helps myself and others who read the implication.
i.
The thorough description of asymmetric encryption and its use in public key infrastructure (PKI) on page 415 is one chapter topic that can be viewed as unclear. Even though the chapter gives a general overview of asymmetric encryption, including how public and private keys function to secure communications, it can be difficult to understand the nuances of this process without a strong background in cryptography. These include key management, certificate authorities, and the development of trust relationships between entities. Understanding encryption is crucial for protecting digital transactions, but for professionals or students who are unfamiliar with the topic, it can be challenging due to the abstract notions and technical jargon.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help