Using MIS (10th Edition)
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 10.9, Problem 10.1ARQ

Explanation of Solution

Information systems security:

System security is to prevent information from unauthorized access. The goals of information systems are to prevent from information violations, identification of the attacks, and response for developing strategies.

Threat:

A threat is a thing that can cause damage to the organization, IT systems or other networks.

Vulnerability:

It is a path for threats to attack a system. It is a way to increase the availability of accessing individual or organizational assets.

Safeguard:

It is a measurement by an individual or organization to protect occurrence of threats. “Encryption” is a method which acts as a safeguard that encrypt the information of the company so that others can’t access the data.

Target:

Target is the output of threats which can be in the form of assets, bank accounts and statements.

Example:

If the user wants to transact amount through online, he/she must provide the bank details like account number and password over the web to access an account.

Threat in above example: The details of an account may be accessed by any intruder without user’s knowledge which leads to loss of information is one of the threats.

Vulnerability in above example: The same example that was mentioned on “threat”, the vulnerable point is the internet point used to access the user information.

Safeguard in above example: Safeguard is a protection shield that hides the user data from illegal access from threats.

Target in above example: The target of the above example is login the bank account by the intruder without user’s permission.

Types of threats:

There are three types of threats in system security. They are as follows:

  • Human error
  • Computer crime
  • Natural disasters

Human error:

Human error is an error which is caused by a single person like employees or customers. For example, if an employee can accidentally removes or edits customer details.

Computer crime:

It is an illegal access by the hacker via internet or web. This crime can install viruses on computers to corrupt systems and hack information.

Natural disasters:

This threat caused due to natural disasters like accidents, floods or earthquakes. It may cause loss of capability and services.

Types of security losses:

There are five types of security losses in system security are as follows:

  • Unauthorized data disclosure
  • Incorrect data modification
  • Faulty service
  • Denial of service(DOS)
  • Loss of infrastructure

Unauthorized data disclosure: The data disclosure is nothing but data was accessed by unauthorized people may result in loss of information. It might occur accidentally or intentionally.

Incorrect data modification: If the data has been modified incorrectly then the data loss occurred in any organization is termed as incorrect data modification...

Blurred answer
Students have asked these similar questions
I need to develop and run a program that prompts the user to enter a positive integer n, and then calculate the value of n factorial n! = multiplication of all integers between 1 and n, and print the value n! on the screen. This is for C*.
I need to develop and run a C* program to sum up integers from 1 to 100, and print out the sum value on the screen. Can someone help please?
Given the schema below for the widgetshop, provide a schema diagram. Schema name Attributes Widget-schema Customer-schema (stocknum, manufacturer, description, weight, price, inventory) (custnum, name, address) Purchased-schema (custnum, stocknum, pdate) Requestedby-schema (stocknum, custnum) Newitem-schema (stocknum, manufacturer, description) Employee-schema (ssn, name, address, salary) You can remove the Newitem-schema (red).
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning