Ethics of Outsourcing

Cyber Crimes And Solutions

We are currently living in Cyber age, where Internet and computers have major impacts on our way of living, social life and the way we conduct businesses. The usage of information technology has posed great security challenges and ethical questions in front of us. Just as every thing has positives and negatives, usage of information…

Lathi - The Indian Secret Form of Defense

Business Intelligence

1. Companies are aggressively moving to computerized support of their organizations. Can you list at least 2 of the factors driving this move? • Speed and efficiency. • Legibility and accuracy. • Self-sufficiency. • Cheaper research and development. 2. The definition of Business Intelligence (BI) is: BI is an umbrella term that combines architecture, tools,…

Information Security Management System: Introduction to ISO 27001

Information Security Management System: Introduction to ISO 27001

Current Scenario: Present day organizations are highly dependent on Information systems to manage business and deliver products/services. They depend on IT for development, production and delivery in various internal applications. The application includes financial databases, employee time booking, providing helpdesk and other services, providing remote access to customers/ employees, remote access of client systems, interactions…