{"id":575,"date":"2015-04-21T22:58:20","date_gmt":"2015-04-21T22:58:20","guid":{"rendered":"https:\/\/courses.candelalearning.com\/masterybusiness1xngcxmaster\/?post_type=chapter&#038;p=575"},"modified":"2015-07-11T23:51:55","modified_gmt":"2015-07-11T23:51:55","slug":"information-and-cyber-security","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/chapter\/information-and-cyber-security\/","title":{"raw":"Outcome: Information Security and Cybersecurity","rendered":"Outcome: Information Security and Cybersecurity"},"content":{"raw":"<h2>What you\u2019ll learn to do:\u00a0describe risks and challenges associated with information security and cybersecurity that\u00a0businesses face<\/h2>\r\n<a href=\"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-content\/uploads\/sites\/135\/2015\/06\/privacy-policy-510728_1280.jpg\"><img class=\"aligncenter wp-image-3683 size-medium\" src=\"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-content\/uploads\/sites\/135\/2015\/06\/privacy-policy-510728_1280-300x225.jpg\" alt=\"Photo showing a computer keyboard with a chain and padlock wrapped around it\" width=\"300\" height=\"225\" \/><\/a>\r\n\r\nNow that we have acknowledged the amount of data that business collects about people, what are the risks and challenges associated with keeping that information secure? Businesses stand to lose consumer confidence and respect if they allow unauthorized access to customer data. For this reason, businesses take information security and cybersecurity seriously. Despite the importance of protecting customer data, breaches and hacks seem to be more and more common. Is this a result of inadequate\u00a0security measures on the part of the businesses, or are hackers getting better at accessing so-called \"secure networks\"? The answer is probably both. In\u00a0this section you'll learn about some of the ongoing\u00a0security issues businesses face in trying to safeguard their (and their customers')\u00a0electronic communications and data.\r\n<h3>LEARNING ACTIVITIES<\/h3>\r\nThe learning activities for this section include:\r\n<ul>\r\n\t<li>Reading: Security Issues in Electronic Communication<\/li>\r\n\t<li>Self Check: Information Security and Cybersecurity<\/li>\r\n<\/ul>\r\nTake time to review and reflect on this activity\u00a0in order to improve your performance on the assessment for this section.","rendered":"<h2>What you\u2019ll learn to do:\u00a0describe risks and challenges associated with information security and cybersecurity that\u00a0businesses face<\/h2>\n<p><a href=\"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-content\/uploads\/sites\/135\/2015\/06\/privacy-policy-510728_1280.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3683 size-medium\" src=\"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-content\/uploads\/sites\/135\/2015\/06\/privacy-policy-510728_1280-300x225.jpg\" alt=\"Photo showing a computer keyboard with a chain and padlock wrapped around it\" width=\"300\" height=\"225\" srcset=\"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-content\/uploads\/sites\/135\/2015\/06\/privacy-policy-510728_1280-300x225.jpg 300w, https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-content\/uploads\/sites\/135\/2015\/06\/privacy-policy-510728_1280-1024x768.jpg 1024w, https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-content\/uploads\/sites\/135\/2015\/06\/privacy-policy-510728_1280-65x49.jpg 65w, https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-content\/uploads\/sites\/135\/2015\/06\/privacy-policy-510728_1280-225x169.jpg 225w, https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-content\/uploads\/sites\/135\/2015\/06\/privacy-policy-510728_1280-350x263.jpg 350w, https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-content\/uploads\/sites\/135\/2015\/06\/privacy-policy-510728_1280.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Now that we have acknowledged the amount of data that business collects about people, what are the risks and challenges associated with keeping that information secure? Businesses stand to lose consumer confidence and respect if they allow unauthorized access to customer data. For this reason, businesses take information security and cybersecurity seriously. Despite the importance of protecting customer data, breaches and hacks seem to be more and more common. Is this a result of inadequate\u00a0security measures on the part of the businesses, or are hackers getting better at accessing so-called &#8220;secure networks&#8221;? The answer is probably both. In\u00a0this section you&#8217;ll learn about some of the ongoing\u00a0security issues businesses face in trying to safeguard their (and their customers&#8217;)\u00a0electronic communications and data.<\/p>\n<h3>LEARNING ACTIVITIES<\/h3>\n<p>The learning activities for this section include:<\/p>\n<ul>\n<li>Reading: Security Issues in Electronic Communication<\/li>\n<li>Self Check: Information Security and Cybersecurity<\/li>\n<\/ul>\n<p>Take time to review and reflect on this activity\u00a0in order to improve your performance on the assessment for this section.<\/p>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-575\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Original<\/div><ul class=\"citation-list\"><li><strong>Authored by<\/strong>: Linda Williams and Lumen Learning. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY: Attribution<\/a><\/em><\/li><\/ul><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Shared previously<\/div><ul class=\"citation-list\"><li>Keyboard security. <strong>Authored by<\/strong>: Succo. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/pixabay.com\/en\/privacy-policy-keyboard-security-510728\/\">https:\/\/pixabay.com\/en\/privacy-policy-keyboard-security-510728\/<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/about\/cc0\">CC0: No Rights Reserved<\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section>","protected":false},"author":78,"menu_order":10,"template":"","meta":{"_candela_citation":"[{\"type\":\"original\",\"description\":\"\",\"author\":\"Linda Williams and Lumen Learning\",\"organization\":\"\",\"url\":\"\",\"project\":\"\",\"license\":\"cc-by\",\"license_terms\":\"\"},{\"type\":\"cc\",\"description\":\"Keyboard security\",\"author\":\"Succo\",\"organization\":\"\",\"url\":\"https:\/\/pixabay.com\/en\/privacy-policy-keyboard-security-510728\/\",\"project\":\"\",\"license\":\"cc0\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"bfcece62-c6b4-41f6-a2d9-b818b4acddb5","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-575","chapter","type-chapter","status-publish","hentry"],"part":95,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-json\/pressbooks\/v2\/chapters\/575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-json\/wp\/v2\/users\/78"}],"version-history":[{"count":15,"href":"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-json\/pressbooks\/v2\/chapters\/575\/revisions"}],"predecessor-version":[{"id":5148,"href":"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-json\/pressbooks\/v2\/chapters\/575\/revisions\/5148"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-json\/pressbooks\/v2\/parts\/95"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-json\/pressbooks\/v2\/chapters\/575\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-json\/wp\/v2\/media?parent=575"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-json\/pressbooks\/v2\/chapter-type?post=575"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-json\/wp\/v2\/contributor?post=575"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wmintrobusinessx51xmaster\/wp-json\/wp\/v2\/license?post=575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}