O'Reilly logo

Information Technology for Management: Advancing Sustainable, Profitable Business Growth, 9th edition by Gregory R. Wood, Linda Volonino, Efraim Turban

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

CyberSecurity, Compliance, and Business Continuity

Quick Look

Case 1, Opening Case: Managing BYOD Security Risks

5.1 Up Close Look at Cybercrimes, Criminals, and Motivations

5.2 IT Vulnerabilities and Threats

5.3 Defending Against Fraud

5.4 Information Assurance and Risk Management

5.5 Network Security

5.6 Internal Control and Compliance

5.7 Business Continuity and Auditing Key Terms

Chapter 5 Link Library

Evaluate and Expand Your Learning

  • IT and Data Management Decisions
  • Questions for Discussion & Review
  • Online Activities
  • Collaborative Work

Case 2, Business Case: Army Deploys Androids, Securely

Case 3, Video case: Cars, Appliances Could Be Hack Targets

Data Analysis & Decision Making: Financial Impact of Breached Protected Health Information

References

Learning Outcomes

images Describe the types of cybercrimes facing organizations and critical infrastructures, explain the motives of cybercriminals, and evaluate the financial value of cybersecurity.

images Explain both low-tech and high-tech methods used to gain access to a company's networks and databases, the vulnerabilities of information systems, and cybercrime symptoms. Describe the critical role of senior management, acceptable use policies, security procedures, and IT for defense-in-depth.

Describe types and characteristics ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required