{"id":11262,"date":"2018-05-29T22:50:09","date_gmt":"2018-05-29T22:50:09","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/?post_type=chapter&#038;p=11262"},"modified":"2024-05-07T16:57:41","modified_gmt":"2024-05-07T16:57:41","slug":"introduction-to-information-security-and-cybersecurity","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/chapter\/introduction-to-information-security-and-cybersecurity\/","title":{"raw":"Introduction to Current Issues in IT","rendered":"Introduction to Current Issues in IT"},"content":{"raw":"<h2>What you\u2019ll learn to do:\u00a0Identify security, privacy and ethical issues affected by information technology<\/h2>\r\n<img class=\"alignright wp-image-3683\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images-archive-read-only\/wp-content\/uploads\/sites\/750\/2015\/06\/23083030\/privacy-policy-510728_1280.jpg\" alt=\"decorative image\" width=\"300\" height=\"225\" \/>\r\n\r\nNow that we have acknowledged the amount of data that business collects about people, what are the risks and challenges associated with keeping that information secure? Businesses stand to lose consumer confidence and respect if they allow unauthorized access to customer data. For this reason, businesses take information security and cyber-security seriously. Despite the importance of protecting customer data, breaches and hacks seem to be more and more common.\r\n\r\nIs this a result of inadequate\u00a0security measures on the part of the businesses, or are hackers getting better at accessing so-called \"secure networks\"? The answer is probably both. In\u00a0this section you'll learn about some of the ongoing\u00a0security issues businesses face in trying to safeguard their (and their customers')\u00a0electronic communications and data.","rendered":"<h2>What you\u2019ll learn to do:\u00a0Identify security, privacy and ethical issues affected by information technology<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-3683\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images-archive-read-only\/wp-content\/uploads\/sites\/750\/2015\/06\/23083030\/privacy-policy-510728_1280.jpg\" alt=\"decorative image\" width=\"300\" height=\"225\" \/><\/p>\n<p>Now that we have acknowledged the amount of data that business collects about people, what are the risks and challenges associated with keeping that information secure? Businesses stand to lose consumer confidence and respect if they allow unauthorized access to customer data. For this reason, businesses take information security and cyber-security seriously. Despite the importance of protecting customer data, breaches and hacks seem to be more and more common.<\/p>\n<p>Is this a result of inadequate\u00a0security measures on the part of the businesses, or are hackers getting better at accessing so-called &#8220;secure networks&#8221;? The answer is probably both. In\u00a0this section you&#8217;ll learn about some of the ongoing\u00a0security issues businesses face in trying to safeguard their (and their customers&#8217;)\u00a0electronic communications and data.<\/p>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-11262\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Original<\/div><ul class=\"citation-list\"><li>Introduction to Current Issues in IT. <strong>Authored by<\/strong>: Linda Williams. <strong>Provided by<\/strong>: Lumen Learning. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY: Attribution<\/a><\/em><\/li><\/ul><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Shared previously<\/div><ul class=\"citation-list\"><li>Keyboard security. <strong>Authored by<\/strong>: Succo. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/pixabay.com\/en\/privacy-policy-keyboard-security-510728\/\">https:\/\/pixabay.com\/en\/privacy-policy-keyboard-security-510728\/<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/about\/cc0\">CC0: No Rights Reserved<\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section>","protected":false},"author":163,"menu_order":15,"template":"","meta":{"_candela_citation":"[{\"type\":\"original\",\"description\":\"Introduction to Current Issues in IT\",\"author\":\"Linda Williams\",\"organization\":\"Lumen Learning\",\"url\":\"\",\"project\":\"\",\"license\":\"cc-by\",\"license_terms\":\"\"},{\"type\":\"cc\",\"description\":\"Keyboard security\",\"author\":\"Succo\",\"organization\":\"\",\"url\":\"https:\/\/pixabay.com\/en\/privacy-policy-keyboard-security-510728\/\",\"project\":\"\",\"license\":\"cc0\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"96b7bd66-1836-4e06-85f4-a1ce5851abc7","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-11262","chapter","type-chapter","status-publish","hentry"],"part":11240,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/users\/163"}],"version-history":[{"count":9,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11262\/revisions"}],"predecessor-version":[{"id":15541,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11262\/revisions\/15541"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/parts\/11240"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11262\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/media?parent=11262"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapter-type?post=11262"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/contributor?post=11262"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/license?post=11262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}