Tổng hợp tất cả tài liệu, ebook, giáo trình Khối Ngành Kinh Tế chọn lọc và hay nhất.
Security (Chapter 8) Access to the system and its data is controlled and restricted to legitimate users. Confidentiality (Chapter 8) Sensitive organizational information (e.g., marketing plans, trade secrets) is protected from unauthorized disclosure. Privacy (Chapter 9) Personal information about customers is collected, used, disclosed, and m...
14 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 759 | Lượt tải: 0
Learning Objectives Identify and explain controls designed to protect the confidentiality of sensitive corporate information. Identify and explain controls designed to protect the privacy of customers’ personal information. Explain how the two basic types of encryption systems work.
16 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 726 | Lượt tải: 0
Discuss how the COBIT framework can be used to develop sound internal control over an organization’s information systems. Explain the factors that influence information systems reliability. Describe how a combination of preventive, detective, and corrective controls can be employed to provide reasonable assurance about information security.
23 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 739 | Lượt tải: 0
Learning Objectives Explain basic control concepts and explain why computer control and security are important. Compare and contrast the COBIT, COSO, and ERM control frameworks. Describe the major elements in the internal environment of a company Describe the four types of control objectives that companies need to set. Describe the events that...
20 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 748 | Lượt tải: 0
Learning Objectives Compare and contrast computer attack and abuse tactics. Explain how social engineering techniques are used to gain physical or logical access to computer resources. Describe the different types of malware used to harm computers.
13 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 1089 | Lượt tải: 0
Explain the threats faced by modern information systems. Define fraud and describe the process one follows to perpetuate a fraud. Discuss who perpetrates fraud and why it occurs, including: the pressures, opportunities, and rationalizations that are present in most frauds. Define computer fraud and discuss the different computer fraud classifi...
15 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 775 | Lượt tải: 0
Explain the importance and advantages of databases. Describe the difference between database systems and file-based legacy systems. Explain the difference between logical and physical views of a database. Explain fundamental concepts of database systems such as DBMS, schemas, the data dictionary, and DBMS languages. Describe what a relational d...
19 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 692 | Lượt tải: 0
Prepare and use data flow diagrams to understand, evaluate, and document information systems. Prepare and use flowcharts to understand, evaluate, and document information systems.
19 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 866 | Lượt tải: 0
Learning Objectives Describe the four major steps in the data processing cycle. Describe the major activities in each cycle. Describe documents and procedures used to collected and process data. Describe the ways information is stored in computer-based information systems. Discuss the types of information that an AIS can provide. Discuss how ...
20 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 777 | Lượt tải: 0
Distinguish between data and information. Discuss the characteristics of useful information. Explain how to determine the value of information. Explain the decisions an organization makes and the information needed to make them. Identify the information that passes between internal and external parties and an AIS. Describe the major business ...
21 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 722 | Lượt tải: 0