Ifsm 430 Final Exam
By: ElvisOnTour • February 6, 2018 • Exam • 2,537 Words (11 Pages) • 1,122 Views
Xxxx X. Xxxx
IFSM 430 Final Exam
U of M Term II / 11 Oct 17
Question #1
The Internet's overall impact upon how business is conducted, to my mind, slight. The Internet's primary impact upon business remains that of assisting consumers and businesses make more well informed purchase decisions and market assessments. I believe that, compared to in-person retail and catalog sales, the Internet accounts for just a small proportion of the global business conducted and I hold this viewpoint for a number of reasons.
Firstly, there is the consumer perception that business transactions conducted on-line present greater security risks than those that are not. Specifically, there is consumer reluctance to divulge credit card information in this arena.
Secondly, the Internet has only fairly recently transitioned into a viable tool for commerce. This is to say that the Internet's origins, as an instrument for global dissemination of information was not initially exploited for commercial purposes. The transition is well underway of course, as an increasing numbers of businesses establish Internet-oriented advertising schemes or develop and maintain their own sites.
Lastly, there is no question that the inadequacy and vagueness of "electronic business law" is a limiting factor upon the Internet's impact. Contractually based relationships are particularly vulnerable, as a fail-safe method to ensure validity and compliance remains non-existent. Our existing copyright laws just barely take into account technological advances provided by the Internet. International business is equally unprotected.
Once Internet technology improves upon its deficiencies, its impact upon business will increase exponentially, and that impact will be felt in a wider variety of business sectors, such as services and the on-line distribution of entertainment. Perhaps in the future a larger portion of durable goods and commodities sales can be conducted exclusively through the Internet.
Question #2
Professionals cognizant of computer security issues have demonstrated their concern by their actions, to include establishing organizational computer security programs, installation of computer virus defenses, issuance and proper use of passwords, and controls and policies.
Organizational computer security programs have been established as work centers become increasingly information technology intensive. In some cases, either a person or a collective oversees program compliance and conducts employee training and familiarization. The central objective is resource protection.
While piece of a computing system is a potential target for criminals, the proliferation of macro viruses, for one example, has necessitated that professionals implement counter-measures and install software defenses to combat potentially destructive pay-loads. Contemporary professionals can ill afford the loss of voluminous amounts of information and archives affected by viruses and malicious code.
In a shared work station or network environment particularly, the issuance and proper use of passwords has become critical. Professionals that are accountable for these systems, such as network administrators, or those who simply use these systems must concern themselves with computer security issues and most do so accordingly.
Professionals must be capable of selecting or perhaps developing protective measures that will ensure, as high as reasonably achievable, protection of hardware, software, and data against attacks. Towards this end, professionals have shown they are interested in the implementation of encryption techniques, software controls, hardware controls, physical controls, and policies. These are not always expensive, and most are founded upon good common sense.
Question #3
The freedoms of the Internet will ultimately yield to or be expanded based upon political actions or and decisions rendered through judicial process. The existing paradigm that presents itself pits those who are computer literate against those who are largely computer illiterate.
The key to individual users working towards protecting their freedoms on the Internet is fostering and contributing to awareness campaigns and mobilization. Only through education and awareness will computer literacy rise among the techno-phobic, the disinterested.
Mobilization is more difficult to execute, as it essentially will call for a formal, global, Internet-user organization bound to an ethical code yet to be codified. Freedoms on the Internet are by no means assured, and if users are unable or refuse to self-regulate there are countless government agencies that will graciously oblige us with draconian laws and standards.
Public opinion - in this instance relating to Internet freedoms - has consistently been a primary force for change in American politics. Relevant examples of this include numerous proposals to protect children from on-line predatory practices or adult themes, web sight rating systems, and the goal to furnish public education classrooms with access to the "Information Superhighway."
Judicial proceedings and reviews have addressed and rendered verdicts on computer criminology, technological mis-appropriations, and resolution of ethical disputes.
The Internet has quickly become a prime social and political target for moralizing, sermonizing, taxation, regulation, and restriction. To its proponents, the Internet is the actualization of free and open global exchange, to its detractors it has dethroned television as the world's supreme imperial evil.
Question #4
Certainly, information security is a concern. It is a concern because of the rate at which computer usage has spread. It is a concern because banking, ordering and purchasing goods and even contractual arrangements can be conducted within this ever expanding and evolving medium. Further, there are significant security differences between the protection of computing systems and the protection of money.
The size and portability alone of the physical devises used in computing legitimizes information security as a concern. These devises are so small that thousands of dollars of computer components can easily be stashed and stolen in a briefcase. Lucrative markets for pirated software products have begun to spread and become better organized; several programs on one disc are sold for a fraction of their retail value.
Financial institutions conduct the bulk of their transactions through electronic funds transfers. Utilities, insurance agencies, and mortgage companies are heavily reliant upon automation to process deductions against accounts. Home shoppers transfer funds between accounts. This environment lends itself to criminal exploitation because unlike robbing a bank, the criminal has an ability to avoid and evade physical contact.
Information stored on computers can be extremely valuable; the identities of FBI covert agents and informants are one example. Tax profiles, investments, medical files, education records – in addition to very sensitive information concerning military targets, capabilities, and weapons stockpiles – requires due consideration be afforded to information security to prevent leaks, breaches of confidentiality, and data modification or deletion.
Question #5
On a strategic level, I can envision a global governmental agency that sanctions organizational and personal security assessments which provide universal security profiles. These security profiles will be similar to intelligence information; identifying the user, equipment and software employed, level of sensitive information processed, and methods of receipt.
The security assessments will be mandatory and implemented methodically. While their overt purpose will be to neutralize criminality, they may also be used to restrict or revoke access to technological architectures. The governing body will have international, federal, state, and local branches to administrate and initiate global law enforcement procedures.
At the operational level, I think the future of computer security holds increased use of voice recognition and biometrics. Digital signatures will be revolutionized, and encryption methods will improve. Firewalls and source verification using public key encryption techniques will be implemented to alleviate Internet security concerns and for the control of information.
Electronic mail options offering privacy-enhancement will become common and will verify the authenticity of the sender. However, electronic mail will become as rigorously controlled as the United States Postal Service, with surcharges and taxation levied on message traffic.
It sounds bleak, but there’s money to be made off of computer security and it will be.
Question #6
The security method discussed in class, which I believe to be most important, is the Clipper Chip. The government’s proposed Clipper Chip, an instrument of zealous desire to monitor and control, is a direct attack upon the preservation of individual rights.
...