Information Systems for Business and Beyond (2019)

9. What is a firewall? 10. What does the term physical security mean?

Exercises

1. Describe one method of multi-factor authentication that you have experienced and discuss the pros and cons of using multi-factor authentication. 2. What are some of the latest advances in encryption technologies? Conduct some independent research on encryption using scholarly or practitioner resources, then write a two- to three-page paper that describes at least two new advances in encryption technology. 3. Find favorable and unfavorable articles about both blockchain and bitcoin. Report your findings, then state your own opinion about these technologies 4. What is the password policy at your place of employment or study? Do you have to change passwords every so often? What are the minimum requirements for a password? 5. When was the last time you backed up your data? What method did you use? In one to two pages, describe a method for backing up your data. Ask your instructor if you can get extra credit for backing up your data. 6. Find the information security policy at your place of employment or study. Is it a good policy? Does it meet the standards outlined in the chapter? 7. How diligent are you in keeping your own information secure? Review the steps listed in the chapter and comment on your security status.

Information Systems for Business and Beyond (2019) pg. 138

Made with FlippingBook flipbook maker