EBK USING MIS
EBK USING MIS
10th Edition
ISBN: 8220103633642
Author: KROENKE
Publisher: YUZU
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 10.9, Problem 10.1ARQ

Explanation of Solution

Information systems security:

System security is to prevent information from unauthorized access. The goals of information systems are to prevent from information violations, identification of the attacks, and response for developing strategies.

Threat:

A threat is a thing that can cause damage to the organization, IT systems or other networks.

Vulnerability:

It is a path for threats to attack a system. It is a way to increase the availability of accessing individual or organizational assets.

Safeguard:

It is a measurement by an individual or organization to protect occurrence of threats. “Encryption” is a method which acts as a safeguard that encrypt the information of the company so that others can’t access the data.

Target:

Target is the output of threats which can be in the form of assets, bank accounts and statements.

Example:

If the user wants to transact amount through online, he/she must provide the bank details like account number and password over the web to access an account.

Threat in above example: The details of an account may be accessed by any intruder without user’s knowledge which leads to loss of information is one of the threats.

Vulnerability in above example: The same example that was mentioned on “threat”, the vulnerable point is the internet point used to access the user information.

Safeguard in above example: Safeguard is a protection shield that hides the user data from illegal access from threats.

Target in above example: The target of the above example is login the bank account by the intruder without user’s permission.

Types of threats:

There are three types of threats in system security. They are as follows:

  • Human error
  • Computer crime
  • Natural disasters

Human error:

Human error is an error which is caused by a single person like employees or customers. For example, if an employee can accidentally removes or edits customer details.

Computer crime:

It is an illegal access by the hacker via internet or web. This crime can install viruses on computers to corrupt systems and hack information.

Natural disasters:

This threat caused due to natural disasters like accidents, floods or earthquakes. It may cause loss of capability and services.

Types of security losses:

There are five types of security losses in system security are as follows:

  • Unauthorized data disclosure
  • Incorrect data modification
  • Faulty service
  • Denial of service(DOS)
  • Loss of infrastructure

Unauthorized data disclosure: The data disclosure is nothing but data was accessed by unauthorized people may result in loss of information. It might occur accidentally or intentionally.

Incorrect data modification: If the data has been modified incorrectly then the data loss occurred in any organization is termed as incorrect data modification...

Blurred answer
Students have asked these similar questions
General accounting
JOB UPDATE Apply on- VinkJobs.com @ OR Search "Vinkjobs.com" on Google COMPANY JOB PROFILE JOB LOCATION INTELLIFLO APPLICATION DEVELOPER MULTIPLE CITIES GLOBAL LOGIC SOFTWARE ENGINEER/SDET DELHI NCR SWIGGY SOFTWARE DEVELOPMENT BENGALURU AVALARA SOFTWARE ENGINEER (WFH) MULTIPLE CITIES LENSKART FULL STACK DEVELOPER MULTIPLE CITIES ACCENTURE MEDPACE IT CUST SERVICE SOFTWARE ENGINEER MUMBAI MUMBAI GENPACT BUSINESS ANALYST DELHI NCR WELOCALIZE WORK FROM HOME MULTIPLE CITIES NTT DATA BPO ASSOCIATE DELHI NCR
+is+how+many+tree+in+ipl&rlz=1C1GCEA_enIN1122IN1122&oq=1+dot+ball+is+how+many+tree+in Google 1 dot ball is how many tree in ipl All Images News Videos Short videos Shopping Web More 500 trees 4) हिन्दी में In English The step was a part of the Board of Control for Cricket in India's green initiative. The BCCI, having partnered with the Tata Group, has promised to plant as many as 500 trees for every dot ball bowled in the Indian Premier League. 25 Mar 2025 Sportstar https://sportstar.thehindu.com > Cricket IPL IPL News IPL 2025: Why are green tree symbols showing up for every ... A Translate to fo-d About featured snippets . Feedback Tools
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning