Pages

Hello People

Welcome to my Blog site, hope you'll find useful information here as well as fun stuffs too.

FREELANCER.COM

Freelancer.com offers you a lot of opportunities, just try it yourself and be a freelancer. Freelance Jobs

Tuesday, February 15, 2011

Closing case study 2 chapter 8

1. If you were the manager of a company where it was discovered that credit card information had been stolen, what responsibility would you have to the people whose personal information was compromised? What are the pros and cons of notifying and of not notifying possible victims?
2. E*Trade, a leader in online brokerage services, is the first company to go to a two-factor authentication system optionally available to its customers with accounts of $50,000 or more. The first factor is the ID and password that customers have always needed, and second, they use a security token or, as E*Trade calls it, a Digital Security ID. This is a little device that you can carry on your key chain that displays a new random six-digit number every minute. E*Trade's host system must, of course, synchronize with the device.When you log in, you have to type in this number after your ID and password. Since the number changes so often's it's virtually impossible to hack an account with this two-pronged protection. From a consumer's point of view, do you think this is a good idea? What are the advantages and disadvantages of the system to businesses and customers? With which online transactions would you consider it worthwhile to enforce this level of security? Remember that you might have a lot of these tokens if you use a lot of online services.
3. In this case study you saw how personal information can be stolen from huge databases and data warehouses. What other ways are there that thieves can obtain personal information about you that would allow them to steal your identity and run up debts in your name? To what extent would you be liable for these debts? What would you have to do (What steps would you take) to reestablish your financial identity if you discovered your identity had been stolen?
4. In the case of the Bank of America, the data was being shipped on tapes to a safe location.This is very good backup policy to make sure that in the event of a major disaster like a fire or flood, data can be quickly restored enabling the company to be back in operation as soon as possible. However, this procedure leaves the company vulnerable to old-fashioned theft of the physical tapes containing personal information. What are two ways that this information that travels on trucks and planes could be protected?

Closing case study 1 chapter 8

1.If you were to give advice to someone who had just started using e-mail,or even someone who's been using e-mail for a while,what would you tell that person should be the one guiding principle in all their e-mail communications? Put your advice into a sentence.
2.Now expand on your one guiding principle in question 1, and offer 10 rules for writing e-mails.What should does 10 rules be?
3.Imagine you're a manager in a lawn care business and you have an office staff of five people.Your lawyer suggests that you issue guidelines or rules to your staff about storing e-mail on the company's server and on the computers they use in their work for you.what should those guidelines be? What would the rules be? Be sure to explain your rationale.
4. Do you think there should be a federal guidelines governing a business's e-mail traffic just as there are regarding a business's financial records? If so, what should they be? If not, why not?

FREELANCER.COM