
Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 7, Problem 6MBD
Explanation of Solution
Importance of securing data:
It is important to secure data because:
- Securing data prevents the compromise or loss of data contained in the
database , an event which could have serious ramifications for any company. - Securing data block attacks from unauthorized users or hackers which prevents the loss of sensitive information.
- Securing data prevents malware infections and stop viruses stealing data.
- Securing data ensures that physical damage to the server doesn’t result in the loss of data.
- Securing data prevents data loss through corruption of files or
programming errors.
Customer data hacking:
Following are the things that can happen when someone accesses the customer database:
- They can spend all the money: If someone manages to steal financial information from the user, then they can drain the bank accounts, drain your credit and debit cards, and quickly deposit all of the money into their accounts in no time at all.
- They can put the safety of the user and user’s family at risk: If someone was able to access addresses, phone numbers, drivers license numbers, passport numbers and PO Box addresses then they can put the physical safety of user and user’s family at risk.
- They can kill credit rating: When someone has user’s bank account and credit card details, the damage they can do to the users financial state is incredible.
Changing information in customer data:
When someone changes information in customer data are:
- Personally identifiable information is defined as data that can be used to identify, locate, or contact a specific individual and when hacker changes information then attackers can often go for malicious attacks that impact the victim directly, by applying for loans or credit cards under the user’s name, filing fraudulent income tax returns, and applying for loans under the victim’s name.
- Financial information such as banking information, billing accounts, insurance information and other data that can be used to access accounts or process financial transactions which when manipulated could greatly impact a user’s finances...
Expert Solution & Answer

Want to see the full answer?
Check out a sample textbook solution
Students have asked these similar questions
Please answer the question correctly please. Thank you!!
Please answer the question correctly please. Thank you!!
Please answer the question correctly please. Thank you!!
Chapter 7 Solutions
Business Driven Technology
Knowledge Booster
Similar questions
- Please answer the question correctly please. Thank you!!arrow_forwardPlease solve and answer the questions correctly please. Thank you!!arrow_forwardConsidering the TM example of binary sum ( see attached)do the step-by-step of execution for the binary numbers 1101 and 11. Feel free to use the Formal Language Editor Tool to execute it; Write it down the current state of the tape (including the head position) and indicate the current state of the TM at each step.arrow_forward
- I need help on inculding additonal code where I can can do the opposite code of MatLab, where the function of t that I enter becomes the result of F(t), in other words, turning the time-domain f(t) into the frequency-domain function F(s):arrow_forwardI need help with the TM computation step-by-step execution for the binary numbers 1101 and 11. Formal Language Editor Tool can be used to execute it; Write it down the current state of the tape (including the head position) and indicate the current state of the TM at each step;arrow_forwardWriting an introduction manual for software designarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning

Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning