ACCT 4290 Chapter Notes - Chapter 9: Public Key Infrastructure, Information Rights Management, Short Code

24 views5 pages

Document Summary

4 basic actions in preserving confidentiality (1) identify & classify information to be protected. Encryption is the only way to protect information in transit over the. Internet: necessary to protect information stored on websites or in a public cloud. Encrypting data protects it from unauthorized access but only while it"s stored or being transmitted (not during processing; since it has to be decrypted to process) So employees who run programs that use the sensitive information can potentially view confidential information. Screen protection devices limiting distance/angle from which information can be seen. Proper disposal of computer media requiring software to wipe" media clean: using built-in system commands to delete information is insufficient because many programs exist that can reverse. Employees need to be taught how to protect confidential data. Employees need to know what they can share with outsiders and what needs to be protected: using encryption software.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents