BUSINESS DRIVEN TECHNOLOGY(LL)-W/ACCESS
BUSINESS DRIVEN TECHNOLOGY(LL)-W/ACCESS
7th Edition
ISBN: 9781260149043
Author: BALTZAN
Publisher: MCGRAW-HILL HIGHER EDUCATION
Expert Solution & Answer
Book Icon
Chapter 17, Problem 4MBD

Explanation of Solution

Importance of securing data:

  • Leaked data could have serious consequences for employees and public.
  • Privacy breaches leads to fines, bas press, reputation damage and loss of trust.
  • The residents’ personal information should be protected.
  • Breaching data protection act may lead to huge fines and it cannot protect job.

Accessing customer database:

  • If customer database is been accessed by someone then name as well as other personal information are stolen.
  • This private information could be used for fraudulent purposes.
  • This information is misused to apply for credit cards, driver’s licenses and other documents.
  • This may destroy credit for person and it will reflect in loan schemes of person.
  • The social security numbers may reveal entire personal data of person.
  • The hackers may even update information for fraudulent activities.

Changing data in customer database:

  • If data in customer database is updated then it creates serious issues.
  • If new data is been added to violent offenders list illegally then it affects innocent people.
  • It may result in facing of legal procedures for the innocent people in customer database...

Blurred answer
Students have asked these similar questions
What did you find most interesting or surprising about the scientist Lavoiser?
1. Complete the routing table for R2 as per the table shown below when implementing RIP routing Protocol? (14 marks) 195.2.4.0 130.10.0.0 195.2.4.1 m1 130.10.0.2 mo R2 R3 130.10.0.1 195.2.5.1 195.2.5.0 195.2.5.2 195.2.6.1 195.2.6.0 m2 130.11.0.0 130.11.0.2 205.5.5.0 205.5.5.1 R4 130.11.0.1 205.5.6.1 205.5.6.0
Analyze the charts and introduce each charts by describing each. Identify the patterns in the given data. And determine how are the data points are related.   Refer to the raw data (table):
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning