Internal And Outsourced IT & Security Threats

Choose Two of the topics related to this week’s materials to discuss in-depth:

  1. Managing IS/IT in Small vs. Large Companies
    Some companies are so small there is not an IS/IT department. This is in contrast to larger companies that most often have at least one person in the company responsible for IS/IT if not an entire department. Is a company ever too small or too large to adequately manage IS/IT? If so, explain. If not, explain why not.
  2. Outsourcing
    Considering the benefits and risks of outsourcing, describe a situation in which outsourcing is out of the question. Describe a situation in which outsourcing is the best option. How can the risks of outsourcing be mitigated?
  3. Passwords
    Find a website or program that generates passwords and share the link to the site. Generate a strong password with this site and share that password in the post. What are the benefits and risks of using such tools to create passwords? Provide 3 important but simple password rules to ALWAYS follow. Find a list of most used passwords. Which 3 items in the list do you think are the worst? Why? (This might be tough because all of them are pretty bad!)
  4. Tightrope Walking [Ethics]
    What factors are involved when balancing security and usability? Provide an example of when security and usability are in conflict with each other. Provide an example of when security would cause a system to become unusable. How do ethics contribute to making decisions between security and usability?

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s