Q Protecting information resources as well as data communication delivery is one of the greatest concerns for information systems managers. Information can be delivered anywhere and anytime. Some common threats to resources and delivery are rogue access points, DOS attacks, social engineering, viruses, worms and phishing. As an information systems manager, you will want to address these issues and maintain control providing rapid responses as often as needed. One avenue is to use CERT teams, implement fault tolerance, password strategies, encryption measures and many others discussed in the text. What types of networks have you used? What are some experiences you have had concerning the common threats listed above? How does a network topology affect data communication? Your discussion(s) should be addressed from a managers perspective, personal experiences as related to the information above and the videos content.
View Related Questions