Essentials of MIS (13th Edition)
Essentials of MIS (13th Edition)
13th Edition
ISBN: 9780134802756
Author: Kenneth C. Laudon, Jane Laudon
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem 12CTP
Program Plan Intro

System vulnerability:

  • When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
  • The information systems in many locations are been interconnected through communication networks.
  • The unauthorized access can occur at many access points in network; it is not restricted to single location.
  • The data flowing over networks could be accessed; valuable information could be filched while transmission or data could be altered without authorization.
  • The denial-of-service attacks are launched by intruders to disrupt website operations.
  • Internets are vulnerable than internal networks as it is open to everyone.

Explanation of Solution

Capabilities, best suited business and purchase details:

  • The capability of Kaspersky is shown below:
    • It has the abilities of scanning.
    • It has quick scanning feature for viruses as well as other threats.
    • It checks for well-known malware as well as software vulnerabilities.
    • It warns the security status of PC to user.
    • It uses real time data to scan PC for viruses and threats.
  • The capability of Norton is shown below:
    • It provides threat monitoring in addition to SONAR technologies for safeguard.
    • It can recognize and eliminate virus, spyware as well as other attacks.
    • It can recognize threats from operating system along with web browser vulnerabilities.
    • The users can excess knowledge base as well as information regarding harmful files and applications.
    • It locates utmost vulnerable system regions.
    • It scans infected areas that efficiently allocate system resources to place with highest potential threat...

Explanation of Solution

The choice of product:

  • The details of antivirus products are shown below:
CharacteristicsKaspersky Antivirus 2012Norton Antivirus 2012
Anti-root kitNoYes
Anti-spywareYesYes
AntivirusYesYes
Boot time scanNoYes

Blurred answer
Students have asked these similar questions
you will be writing an essay to discuss the evolution of hacking. Your Essay should highlight the evolution of hacking from individuals to corporations (and their predominate locations) to cyber warfare. Include at least 5 different locations and events (more is better) to tell the story of how hacking has changed over time from the 1940's to present. Use your specific events to illustrate both when and what happened in each of these locations/events that changed the face of hacking as well as the global nature of hacking. The events should be presented in time order. Also include images or figures, and any additional visual aids to help tell your story. Where did the hack originate, who was the target if known, how did this event affect hacking as we know it, what was significant about this event. Your 5 or more locations should include at least 2 (preferably 3 or more) international locations as well as at least one United States location.
4. College Security Computer and online security is a growing concern for businesses of all sizes. Computer security issues range from viruses to automated Internet attacks to outright theft, the result of which is lost information and lost time. Security issues pop up in news articles daily, and most business owners understand the need to secure their businesses. Your college is no different from any other business when it comes to information security. Draft a document identifying the questions you should ask your college's CIO to ensure information security across your campus.
Nearly a decade has passed sinuce the National Academy of Engineers declared Cyber Security a "grand challenge for the next century." Every day there is news on ways in which cyber security challenges and responses are complicating every aspect of our lives. Can the challenge be solved? (40marks) As a first step to solving any problem, one must understand its nature. So, it is important for all cyber security analysts to keep on top of news stories in the field. In this discussion forum we will do just that with the hope that everyone will make it a daily habit throughout their career. Today, some cyber news has been flooded out of the headlines by Hurricane Harvey, but as noted in this article, cyber concerns are front and center as students return to school.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,