Essentials of MIS (12th Edition)
Essentials of MIS (12th Edition)
12th Edition
ISBN: 9780134238241
Author: Kenneth C. Laudon, Jane P. Laudon
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem 12CTP
Program Plan Intro

System vulnerability:

  • When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
  • The information systems in many locations are been interconnected through communication networks.
  • The unauthorized access can occur at many access points in network; it is not restricted to single location.
  • The data flowing over networks could be accessed; valuable information could be filched while transmission or data could be altered without authorization.
  • The denial-of-service attacks are launched by intruders to disrupt website operations.
  • Internets are vulnerable than internal networks as it is open to everyone.

Explanation of Solution

Capabilities, best suited business and purchase details:

  • The capability of Kaspersky is shown below:
    • It has the abilities of scanning.
    • It has quick scanning feature for viruses as well as other threats.
    • It checks for well-known malware as well as software vulnerabilities.
    • It warns the security status of PC to user.
    • It uses real time data to scan PC for viruses and threats.
  • The capability of Norton is shown below:
    • It provides threat monitoring in addition to SONAR technologies for safeguard.
    • It can recognize and eliminate virus, spyware as well as other attacks.
    • It can recognize threats from operating system along with web browser vulnerabilities.
    • The users can excess knowledge base as well as information regarding harmful files and applications.
    • It locates utmost vulnerable system regions.
    • It scans infected areas that efficiently allocate system resources to place with highest potential threat...

Explanation of Solution

The choice of product:

  • The details of antivirus products are shown below:
CharacteristicsKaspersky Antivirus 2012Norton Antivirus 2012
Anti-root kitNoYes
Anti-spywareYesYes
AntivirusYesYes
Boot time scanNoYes

Blurred answer
Students have asked these similar questions
# Find the error# Why will the following code not print out a list of contact namesphoneBook = {'Doe, Jane' : '843-000-0000' ,'Doe, John' : '843-111-1111' ,'Smith, Adam' : '843-222-2222' ,'Jobs, Steve' : '999-333-3333' ,}for contact in phoneBook.values():print(contact)
# Find the error:# The following code creates an empty dictionary and attempts to add a record# Why will the following code not create a new dictionary entry as intended?phoneBook = {}phoneBook{'Jobs, Steve'} = '999-111-1111'
Select all the possible polar representations of the vector that is obtained from rotating where by Zrot Ź x = 3e² T= 3п 8 Hint: Consider the negative angle that is equivalent to the positive angle of the rotated vector. 0
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning