Business Driven Technology
Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
Expert Solution & Answer
Book Icon
Chapter 17, Problem 4MBD

Explanation of Solution

Importance of securing data:

  • Leaked data could have serious consequences for employees and public.
  • Privacy breaches leads to fines, bas press, reputation damage and loss of trust.
  • The residents’ personal information should be protected.
  • Breaching data protection act may lead to huge fines and it cannot protect job.

Accessing customer database:

  • If customer database is been accessed by someone then name as well as other personal information are stolen.
  • This private information could be used for fraudulent purposes.
  • This information is misused to apply for credit cards, driver’s licenses and other documents.
  • This may destroy credit for person and it will reflect in loan schemes of person.
  • The social security numbers may reveal entire personal data of person.
  • The hackers may even update information for fraudulent activities.

Changing data in customer database:

  • If data in customer database is updated then it creates serious issues.
  • If new data is been added to violent offenders list illegally then it affects innocent people.
  • It may result in facing of legal procedures for the innocent people in customer database...

Blurred answer
Students have asked these similar questions
I need to develop and run a program that prompts the user to enter a positive integer n, and then calculate the value of n factorial n! = multiplication of all integers between 1 and n, and print the value n! on the screen. This is for C*.
I need to develop and run a C* program to sum up integers from 1 to 100, and print out the sum value on the screen. Can someone help please?
Given the schema below for the widgetshop, provide a schema diagram. Schema name Attributes Widget-schema Customer-schema (stocknum, manufacturer, description, weight, price, inventory) (custnum, name, address) Purchased-schema (custnum, stocknum, pdate) Requestedby-schema (stocknum, custnum) Newitem-schema (stocknum, manufacturer, description) Employee-schema (ssn, name, address, salary) You can remove the Newitem-schema (red).
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning