Author Question: Discuss some human safeguards for employees that can ensure the security of information systems. ... (Read 94 times)

cnetterville

  • Hero Member
  • *****
  • Posts: 547
Discuss some human safeguards for employees that can ensure the security of information systems.
 
  What will be an ideal response?

Question 2

Name and describe the three primary activities in the business intelligence (BI) process.
 
  What will be an ideal response?


zhanghao

  • Sr. Member
  • ****
  • Posts: 316
Answer to Question 1

Human safeguards involve the people and procedure components of information systems. In general, human safeguards result when authorized users follow appropriate procedures for system use and recovery. Restricting access to authorized users requires effective authentication methods and careful user account management. In addition, appropriate security procedures must be designed as part of every information system, and users should be trained on the importance and use of those procedures.
The various human safeguards for employees are:
Position DefinitionsIt is impossible to have effective human safeguards unless job tasks and responsibilities are clearly defined for each employee position. In general, job descriptions should provide a separation of duties and authorities.
Hiring and ScreeningSecurity considerations should be part of the hiring process. When hiring for high-sensitivity positions, extensive interviews, references, and background investigations are appropriate.
Dissemination and EnforcementEmployee s need to be trained on security policies, procedures, and the responsibilities they will have. Employee security training begins during new-employee training, with the explanation of general security policies and procedures. That general training must be amplified in accordance with the position's sensitivity and responsibilities.
TerminationCompanie s also must establish security policies and procedures for the termination of employees. Standard human resources policies should ensure that system administrators receive notification in advance of the employee's last day, so that they can remove accounts and passwords. Procedures for recovering keys for encrypted data and any other security assets must be part of the employee's out-processing.

Answer to Question 2

The three primary activities in the BI process are: acquire data, perform analysis, and publish results. Data acquisition is the process of obtaining, cleaning, organizing, relating, and cataloging source data. BI analysis is the process of creating business intelligence. The four fundamental categories of BI analysis are reporting, data mining, BigData, and knowledge management. Publish results is the process of delivering business intelligence to the knowledge workers who need it. Push publishing delivers business intelligence to users without any request from the users; the BI results are delivered according to a schedule or as a result of an event or particular data condition. Pull publishing requires the user to request BI results. Publishing media include print as well as online content delivered via Web servers, specialized Web servers known as report servers, and BI results that are sent via automation to other programs.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

In Eastern Europe and Russia, interferon is administered intranasally in varied doses for the common cold and influenza. It is claimed that this treatment can lower the risk of infection by as much as 60–70%.

Did you know?

Green tea is able to stop the scent of garlic or onion from causing bad breath.

Did you know?

The highest suicide rate in the United States is among people ages 65 years and older. Almost 15% of people in this age group commit suicide every year.

Did you know?

Women are 50% to 75% more likely than men to experience an adverse drug reaction.

Did you know?

The U.S. Preventive Services Task Force recommends that all women age 65 years of age or older should be screened with bone densitometry.

For a complete list of videos, visit our video library