Purpose
To assess your ability to:
Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one.
Explain how the four major threats to wireless networks can damage a business.
Action Items
Research the following areas related to protecting sensitive data for the Woodworker Cabinet company. Write a two-to three-page report to the CIO addressing the following issues:
Methods used by various companies to protect organization data. Consider:
Data encryption;
Authentication and authorization; and
Network security measures (e.g., firewalls, spyware protection, etc.).
Ethical issues regarding protection of data. Consider:
Privacy considerations;
Trade secrets (e.g., manufacturing processes, etc.);
Client lists; and
Organizational financial information.