Author Question: Discuss some human safeguards for employees that can ensure the security of information systems. ... (Read 55 times)

cnetterville

  • Hero Member
  • *****
  • Posts: 547
Discuss some human safeguards for employees that can ensure the security of information systems.
 
  What will be an ideal response?

Question 2

Name and describe the three primary activities in the business intelligence (BI) process.
 
  What will be an ideal response?


zhanghao

  • Sr. Member
  • ****
  • Posts: 316
Answer to Question 1

Human safeguards involve the people and procedure components of information systems. In general, human safeguards result when authorized users follow appropriate procedures for system use and recovery. Restricting access to authorized users requires effective authentication methods and careful user account management. In addition, appropriate security procedures must be designed as part of every information system, and users should be trained on the importance and use of those procedures.
The various human safeguards for employees are:
Position DefinitionsIt is impossible to have effective human safeguards unless job tasks and responsibilities are clearly defined for each employee position. In general, job descriptions should provide a separation of duties and authorities.
Hiring and ScreeningSecurity considerations should be part of the hiring process. When hiring for high-sensitivity positions, extensive interviews, references, and background investigations are appropriate.
Dissemination and EnforcementEmployee s need to be trained on security policies, procedures, and the responsibilities they will have. Employee security training begins during new-employee training, with the explanation of general security policies and procedures. That general training must be amplified in accordance with the position's sensitivity and responsibilities.
TerminationCompanie s also must establish security policies and procedures for the termination of employees. Standard human resources policies should ensure that system administrators receive notification in advance of the employee's last day, so that they can remove accounts and passwords. Procedures for recovering keys for encrypted data and any other security assets must be part of the employee's out-processing.

Answer to Question 2

The three primary activities in the BI process are: acquire data, perform analysis, and publish results. Data acquisition is the process of obtaining, cleaning, organizing, relating, and cataloging source data. BI analysis is the process of creating business intelligence. The four fundamental categories of BI analysis are reporting, data mining, BigData, and knowledge management. Publish results is the process of delivering business intelligence to the knowledge workers who need it. Push publishing delivers business intelligence to users without any request from the users; the BI results are delivered according to a schedule or as a result of an event or particular data condition. Pull publishing requires the user to request BI results. Publishing media include print as well as online content delivered via Web servers, specialized Web servers known as report servers, and BI results that are sent via automation to other programs.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Disorders that may affect pharmacodynamics include genetic mutations, malnutrition, thyrotoxicosis, myasthenia gravis, Parkinson's disease, and certain forms of insulin-resistant diabetes mellitus.

Did you know?

There are 60,000 miles of blood vessels in every adult human.

Did you know?

Asthma attacks and symptoms usually get started by specific triggers (such as viruses, allergies, gases, and air particles). You should talk to your doctor about these triggers and find ways to avoid or get rid of them.

Did you know?

Amphetamine poisoning can cause intravascular coagulation, circulatory collapse, rhabdomyolysis, ischemic colitis, acute psychosis, hyperthermia, respiratory distress syndrome, and pericarditis.

Did you know?

It is believed that the Incas used anesthesia. Evidence supports the theory that shamans chewed cocoa leaves and drilled holes into the heads of patients (letting evil spirits escape), spitting into the wounds they made. The mixture of cocaine, saliva, and resin numbed the site enough to allow hours of drilling.

For a complete list of videos, visit our video library