Located in Dawnsville, a quiet village, the Vegan Garden is a small restaurant that serves vegan fare. Since it opened five years ago, the restaurant has been open for business. Cash registers are still used to record sales and old file cabinets are still used to keep monthly sales reports and other corporate paperwork, such as employee and supplier information. There is an information system in place at Vegan Garden, which is why its owner has decided to implement it. An information technology company was hired to help him design an information system that would be consistent with the Vegan Garden's current business practises. You've been given the task of overseeing the construction of the Vegan Garden's information system.   Teach the proprietor of Vegan Garden about the dangers of an insecure computer system as the project manager for the development effort. Any five (5) of the most common security threats to information systems may be listed here.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Located in Dawnsville, a quiet village, the Vegan Garden is a small restaurant that serves vegan fare. Since it opened five years ago, the restaurant has been open for business. Cash registers are still used to record sales and old file cabinets are still used to keep monthly sales reports and other corporate paperwork, such as employee and supplier information. There is an information system in place at Vegan Garden, which is why its owner has decided to implement it. An information technology company was hired to help him design an information system that would be consistent with the Vegan Garden's current business practises.

You've been given the task of overseeing the construction of the Vegan Garden's information system.

 

Teach the proprietor of Vegan Garden about the dangers of an insecure computer system as the project manager for the development effort. Any five (5) of the most common security threats to information systems may be listed here.

Expert Solution
steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Primary components of process planning
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education