Case 1, Opening Case: Managing BYOD Security Risks
5.1 Up Close Look at Cybercrimes, Criminals, and Motivations
5.2 IT Vulnerabilities and Threats
5.3 Defending Against Fraud
5.4 Information Assurance and Risk Management
5.5 Network Security
5.6 Internal Control and Compliance
5.7 Business Continuity and Auditing Key Terms
Chapter 5 Link Library
Evaluate and Expand Your Learning
Case 2, Business Case: Army Deploys Androids, Securely
Case 3, Video case: Cars, Appliances Could Be Hack Targets
Data Analysis & Decision Making: Financial Impact of Breached Protected Health Information
Describe the types of cybercrimes facing organizations and critical infrastructures, explain the motives of cybercriminals, and evaluate the financial value of cybersecurity.
Explain both low-tech and high-tech methods used to gain access to a company's networks and databases, the vulnerabilities of information systems, and cybercrime symptoms. Describe the critical role of senior management, acceptable use policies, security procedures, and IT for defense-in-depth.
Describe types and characteristics ...