Professional Documents
Culture Documents
INFORMATION SECURITY
Privacy- information is to be used only for purposes known to the data owner
- This does not focus on freedom from observation, but rather that information
will be used only in ways known to the owner
Authentication- occurs when a control provides proof that a user possesses the identity
that he or she claims
Management
- A process of achieving objectives using a given set of resources
- To manage the information security process, first understand core principles
Managing Roles
4 areas to explore
- Personal relationship
A false sense of connection
More people are building relationships online and drifting away from the
real worlds
- Decreased Productivity
Soc med before tasks
Soc med allows political figures to be more visible and can harm one’s
reputation
- Social Issues
Cyberbullying
Posting or forwarding a private text or embarrassing image to others
Tricking someone into revealing embarrassing information and forwarding
it to others
Spreading malicious rumors
Stealing passwords
- Disturbing content
Exposure to pornography
- Human Trafficking online