Professional Documents
Culture Documents
1
Objectives Overview
Unethical
Corporate spies Cyberextortionist
employees
Cyberterrorist
• Organizations take
several measures to
help prevent
unauthorized access
and use
– Acceptable use policy
– Disable file and printer
sharing
Signature
Iris recognition
verification
system
system
© 2016 Cengage Learning®. May not be scanned, copied
Pages 224 – 226 or duplicated, or posted to a publicly accessible website, 15
Figures 5-8 – 5-11 in whole or in part.
Unauthorized Access and Use
Law Criminal
enforcement prosecutors
© 2016 Cengage Learning®. May not be scanned, copied
Page 227 or duplicated, or posted to a publicly accessible website, 17
in whole or in part.
Software Theft
Illegally registers
Illegally copies
and/or activates
a program a program
© 2016 Cengage Learning®. May not be scanned, copied
Page 228 or duplicated, or posted to a publicly accessible website, 18
in whole or in part.
Software Theft
Cloud
Storage
© 2016 Cengage Learning®. May not be scanned, copied
Pages 233 - 234 or duplicated, or posted to a publicly accessible website, 27
in whole or in part.
Backing Up – The Ultimate Safeguard
Child
© 2016 Cengage Learning®. May not be scanned, copied
Page 234 28
or duplicated, or posted to a publicly accessible website,
Backing Up – The Ultimate Safeguard
Store user
Allow for
names and/or
personalization
passwords
Assist with
Pages 243 - 244 Track how often
© 2016 Cengage Learning®. May not be scanned, copied
or duplicated, or posted to a publicly accessible website,
in whole or in part.
38
Information Privacy
Many programs exist that easily allow employers to monitor employees. Further, it is legal
for employers to use these programs