MG 362- CHAPTER 13 & 14 HW
docx
keyboard_arrow_up
School
Monroe College *
*We aren’t endorsed by this school
Course
362
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
2
Uploaded by ChefLobster2072
CHAPTER 13: Cybercrime and Information System Security
DIRECTIONS: Please answer each question in a paragraph form.
1.
Provide six reasons why computer incidents are so prevalent.
Computer incidents are prevalent due to various factors. First, the widespread use of technology and interconnected systems increases the attack surface for potential threats. Second, many users lack awareness of security best practices, leading to vulnerable behaviors. Third, the constant evolution of cyber threats and techniques challenges security measures. Fourth, outdated software and unpatched systems create vulnerabilities that attackers exploit. Fifth, the financial gains from cybercrime incentivize attackers. Finally, the growing number of connected devices, the Internet of Things (IoT), introduces more entry points for potential attacks.
2.
Outline the steps necessary to conduct an effective computer security risk assessment.
Conducting an effective computer security risk assessment involves several key steps. First, identify and document all assets, systems, and data to be assessed. Second, assess and prioritize potential threats and vulnerabilities based on their impact and likelihood. Third, evaluate existing security controls and their effectiveness in mitigating risks. Fourth, analyze potential consequences of security breaches and the associated costs. Fifth, develop and implement a risk management plan that includes safeguards, countermeasures, and incident response procedures. Finally, regularly review and update the risk assessment to address new threats and changes in the computing environment.
3.
Discuss the importance of installing computer patches and fixes.
Installing computer patches and fixes is crucial to maintain a secure computing environment. Patches are updates released by software vendors to address identified vulnerabilities and weaknesses in their products. By promptly applying these updates, organizations and users can close security gaps and prevent potential exploitation by attackers. Failing to install patches leaves systems exposed to known threats and increases the risk of cyber-attacks. Regular patch management is essential to ensure the security, stability, and performance of computer systems, safeguarding sensitive data and maintaining the overall integrity of the computing infrastructure.
Chapter 14: Ethical, Legal, and Social Issues of Information Systems
1.
What is ergonomics? How can it be applied to office workers?
Ergonomics is the study of designing and arranging the workplace environment to fit the capabilities and limitations of the individuals working there. For office workers, ergonomics can be applied by optimizing desk and chair height, promoting proper posture, and providing ergonomic tools like adjustable keyboards and mice. It involves designing workstations that reduce strain and discomfort, leading to increased productivity and reduced risk of musculoskeletal injuries.
2.
What is a code of ethics? Give an example.
A code of ethics is a set of principles and guidelines that outline the moral standards and professional conduct expected from individuals in a particular profession or organization. For example, the American Medical Association (AMA) has a code of medical ethics that addresses topics like patient confidentiality, informed consent, and professional integrity. This code serves as a moral compass, guiding healthcare professionals in their decision-making and interactions with patients.
3.
What issues and problems are raised by the use of unintegrated information systems?
The use of unintegrated information systems can lead to several issues and problems. First, data duplication and inconsistency may occur when information is stored separately in different systems, leading to inaccuracies and confusion. Second, the lack of integration can hinder communication and collaboration between different departments, impacting overall efficiency and productivity. Third, security vulnerabilities may arise if data is not adequately protected and managed across various systems. Moreover, unintegrated systems may incur higher maintenance costs and create complexities when trying to streamline processes and access real-time information. To address these challenges, businesses often invest in integrated information systems that ensure data coherence, streamline operations, and enhance overall organizational performance.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help