
Concept explainers
Explanation of Solution
System security is to prevent information from unauthorized access. The goals of information systems are to prevent from information violations, identification of the attacks, and response for developing strategies.
Threat:
A threat is a thing that can cause damage to the organization, IT systems or other networks.
Vulnerability:
It is a path for threats to attack a system. It is a way to increase the availability of accessing individual or organizational assets.
Safeguard:
It is a measurement by an individual or organization to protect occurrence of threats. “Encryption” is a method which acts as a safeguard that encrypt the information of the company so that others can’t access the data.
Target:
Target is the output of threats which can be in the form of assets, bank accounts and statements.
Example:
If the user wants to transact amount through online, he/she must provide the bank details like account number and password over the web to access an account.
Threat in above example: The details of an account may be accessed by any intruder without user’s knowledge which leads to loss of information is one of the threats.
Vulnerability in above example: The same example that was mentioned on “threat”, the vulnerable point is the internet point used to access the user information.
Safeguard in above example: Safeguard is a protection shield that hides the user data from illegal access from threats.
Target in above example: The target of the above example is login the bank account by the intruder without user’s permission.
Types of threats:
There are three types of threats in system security. They are as follows:
- Human error
- Computer crime
- Natural disasters
Human error:
Human error is an error which is caused by a single person like employees or customers. For example, if an employee can accidentally removes or edits customer details.
Computer crime:
It is an illegal access by the hacker via internet or web. This crime can install viruses on computers to corrupt systems and hack information.
Natural disasters:
This threat caused due to natural disasters like accidents, floods or earthquakes. It may cause loss of capability and services.
Types of security losses:
There are five types of security losses in system security are as follows:
- Unauthorized data disclosure
- Incorrect data modification
- Faulty service
- Denial of service(DOS)
- Loss of infrastructure
Unauthorized data disclosure: The data disclosure is nothing but data was accessed by unauthorized people may result in loss of information. It might occur accidentally or intentionally.
Incorrect data modification: If the data has been modified incorrectly then the data loss occurred in any organization is termed as incorrect data modification...

Want to see the full answer?
Check out a sample textbook solution
Chapter 10 Solutions
EBK USING MIS
- Pastner Brands is a calendar-year firm with operations in several countries. As part of its executive compensation plan, at January 1, 2024, the company issued 480,000 executive stock options permitting executives to buy 480,000 shares of Pastner stock for $38 per share. One-fourth of the options vest in each of the next four years beginning at December 31, 2024 (graded vesting). Pastner elects to separate the total award into four groups (or tranches) according to the year in which they vest and measures the compensation cost for each vesting date as a separate award. The fair value of each tranche is estimated at January 1, 2024, as follows: Vesting Date Amount Fair Value Vesting per Option: December 31, 2024 25% $ 3.90 December 31, 2025 25% $ 4.40 25% $ 4.90 25% $ 5.40 December 31, 2026 December 31, 2027 Required: 1. Determine the compensation expense related to the options to be recorded each year 2024-2027, assuming Pastner allocates the compensation cost for each of the four…arrow_forwardWhat is one benefit with regards to time complexity of using a Doubly Linked List as opposed to an Array when implementing a Deque?arrow_forwardWhat is one benefit with regards to space complexity of using a Doubly Linked List as opposed to an Array when implementing a Deque?arrow_forward
- Which basic data structure (Doubly Linked List, Singly Linked List, Array) would you use to implement a Stack? Why?arrow_forwardDid you comment all methods in the Deque class to include 1. The method's behavior 2. Arguments that are passed to the method (if any), their expected types, and what they are used for 3. What the method returns (if any) 4. A description of the behavior of each line in the methodarrow_forwardWhy use a Doubly Linked List as opposed to a Singly Linked List for a Deque?arrow_forward
- this module is java 731 , follow all instructions and make sure the outputs are like what they expect and make sure the code is 100% correct . include all comments , layout and structure to be perfect too, thanks. Question 1: E-Hailing Bicycle Management System Case Study:An e-hailing company that rents out bicycles needs a system to manage its bicycles, users, and borrowing process. Each user can borrow up to 2 bicycles at a time, specifically for families with children 18 years or below. The system must track the bicycles (name, make, type, and availability) and users (name, ID, and borrowed bicycles). The company also wants to ensure that the system uses a multidimensional array to store information about the bicycles. Requirements: Add and View Bicycles: Borrow Bicycles: Return Bicycles Display Borrowed Bicycles and Search for a bicycle Create a menu-driven program to implement the above. Sample Output: Add Bicycle View All Bicycles Borrow Bicycle Return…arrow_forwardAdd a method called transfer () to the BankAccount class, that takes in an amount and destinationAccount as input and transfer the funds from current account to destination account. This method should return the balance of the current account after the transfer, also should check for the sufficient balance in current account before proceeding the transfer and if there is insufficient balance return an error message "Insufficient balance". Modify the BankAccount Test class, so that it calls the transfer () method and prints the balance after transfer. Make sure that the transfer() method updates the balance of both the current account and the destination account.arrow_forward• Create a public method called deposit() that takes in an amount of type double as input and adds the amount to the current balance. This method should also return the updated balance. • Create another public method called withdraw() that takes in an amount of type double as input, checks if the withdrawal amount is less than the current balance, and if so, subtracts the amount from the balance. If the withdrawal amount is greater than the current balance, the method should return an error message "Insufficient balance". • Create a public method getAccountInfo() that returns the account information in the format "Account Number: xxxxx, Account Holder: John Doe, Account Type: SAVINGS/CHECKING, Balance: $xxxX.XX". • Finally, create a constructor method that takes in the account number, account holder name, initial balance and account type as input and initializes the corresponding instance variables. In the BankAccount class, make sure to use the private access modifier for the instance…arrow_forward
- Create a BankAccount Test class that contains a main() method that instantiates an object of type BankAccount, with account number of 12345, account holder name of "John Doe", initial balance of $1000 and account type as SAVINGS . Then use the deposit() and withdraw() methods of the object to deposit $500 and withdraw $300. Finally, use the getAccountInfo() method to print the current account information. Use the getAccountInfo() method to verify that the deposit and withdrawal actions are performed correctly and that the account information is updated accordingly.arrow_forwardAdd a new class checkingAccount that inherits from the BankAccount class, and has a double instance variable overdraft Limit in addition to the variables inherited from the superclass. • Create a constructor for the checking Account class that takes in the account number, account holder name, initial balance, account type and overdraft limit as input, and uses the super keyword to call the constructor of the superclass, passing in the account number, account holder name and initial balance, account type. • Re-write the withdraw() method in the checkingAccount class so that it first checks if the withdrawal amount is less than the current balance plus the overdraft limit. If it is, the withdrawal is allowed and the balance is updated. If not, the method should return an error message "Insufficient funds". • Create a new method displayOverdraft Limit() that returns the overdraft limit of the CheckingAccount . • In the BankAccountTest class, create a new object of type Checking Account…arrow_forwardExplain what the rwpos() function does. What is the base case? What values are passed to the recursive call? What value is returned by the original function call?arrow_forward
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning





