Information Management Chapter 11

Submitted by: Submitted by

Views: 364

Words: 1522

Pages: 7

Category: Business and Industry

Date Submitted: 01/11/2012 04:03 PM

Report This Essay

Module Review 11.1

1. What can be done to improve e-commerce security on the Internet? Give several examples of security measures, and technologies you would use.

As we know that the IT department is responsible for all kinds of stuff that are related to the computer especially the security. So, managers in business think the security is only IT department jobs which is not true, fail to remember that the "I" in IT stands for "information." Therefore, information is the lifeblood of any business. If anyone out of business network gain access to it, all departments is going to be suffered and have bad consequences. We know that It department the one that is in charge for the most security but all the departments should be concerned with keeping the business security safe.

Every computer can be vulnerable to attack. The consequences of such an attack can range from simple inconvenience to financial catastrophe. A single hacker can cause damage to a large number of computer networks and can wreak havoc on both your business and the nation's critical infrastructure.

There are some steps that can be done to improve security of business uses of the internet such as promote narrow compliance and devote in employee security training and automated data protection tools under the IT department. Second, Guard against mobile security threats. The main thing that any business has to have is to have any kind of protection for viruses such a business has to have an Anti-virus on anything connected to the internet to keep out any viruses they would allow anyone into the database of the business. Content filtering and monitoring programs that keep check the business computers and internet sites for any problems that might come up. Also, sniffer software on the internet account to sniff out any problems that might come up and get rid of the problem right then and there. Moreover, don’t open email from unknown sources. Be suspicious of unexpected emails that include...