Professional Documents
Culture Documents
CHAPTER FOUR
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
SECTION 4.1 – Ethics.
• Information Ethics.
• Developing Information Management Policies.
• How
Computer
Viruses
Spread.
• Insiders.
• Social engineering.
• Dumpster diving.
• Pretexting.
1. Content filtering.
2. Encryption.
3. Firewalls.
• Sensitive PII.
• Nonsensitive PII.
• Encryption.
• Public key encryption (PKE).
• Certificate authority.
• Digital certificate.
www.mheducation.com
© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.