Completion requirements
This chapter discusses trends in information technology such as; digital forensics, the shift to a distributed workforce (very relevant during the 2020 COVID-19 global pandemic), and the increasing use of grid computing while acknowledging the rapid pace of change. Consider some benefits to the high-level accessibility of information for the average employee. Conversely, how can this level of access be detrimental to businesses?
Working the Net
- Enterprise resource planning is a major category of business software. Visit the site of one of the following companies: SAP (http://www.sap.com), or Oracle (http://www.oracle.com). Prepare a short presentation for the class about the company's ERP product offerings and capabilities. Include examples of how companies use the ERP software. What are the latest trends in ERP?
- What can intranets and enterprise portals accomplish for a company? Find out by using such resources as Brint.com's Intranet Portal, http://www.brint.com/Intranets.htm. Look for case studies that show how companies apply this technology. Summarize the different features an intranet or enterprise portal provides.
- Learn more about the CERT Coordination Center (CERT/CC), which serves as a center of internet security expertise. Explore its website, https://www.cert.org/index.cfm. What are the latest statistics on incidents reported, vulnerabilities, security alerts, security notes, mail messages, and hotline calls? What other useful information does the site provide to help a company protect IT assets?
- Research the latest developments in computer security at Computerworld's site, http://computerworld.com/. What types of information can you find here? Pick one of the categories in this area (Cybercrime, Encryption, Disaster Recovery, Firewalls, Hacking, Privacy, Security Holes, Vhttp://computerworld.com/securitytopics/securityiruses and Worms, and VPN), and summarize your findings.
- How can someone steal your identity? Using information at the Federal Trade Commission's central website for information about identity theft, https://www.consumer.ftc.gov/features/feature-0014-identity-theft, compile a list of the ways thieves can access key information to use your identity. What steps should you take if you've been a victim of identity theft? Summarize key provisions of federal laws dealing with this crime and the laws in your state.