Essentials of MIS (13th Edition)
13th Edition
ISBN: 9780134802756
Author: Kenneth C. Laudon, Jane Laudon
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 14CSQ
Program Plan Intro
System vulnerability:
- When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
- The
information systems in many locations are been interconnected through communication networks. - The unauthorized access can occur at many access points in network and is not limited to single location.
- The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
- The denial-of-service attacks are launched by intruders to disrupt website operations.
- Internets are vulnerable than internal networks as it is open to everyone.
Explanation of Solution
Responsibility of management:
- The credentials of company’s systems administrators were stolen which helped them to move freely inside system.
- The credentials of administrator should be managed and protected by the company...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
In your role as a CMC, what do you consider to be the most challenging or troublesome scenarios you've encountered?
Was it tough for Kaiser to set up the EHR system for the first time? What can we learn from Kaiser's experience? Then how?
Why is it very crucial to conduct a successful criminal investigation with proper documentation? Create a list of the minimal essentials in terms of the papers that are required for an investigation that does not entail the use of computers.
Chapter 8 Solutions
Essentials of MIS (13th Edition)
Ch. 8.1 - Prob. 1CQ1Ch. 8.1 - Prob. 2CQ1Ch. 8.1 - Prob. 3CQ1Ch. 8.1 - Prob. 4CQ1Ch. 8.4 - Prob. 1CQ2Ch. 8.4 - Prob. 2CQ2Ch. 8.4 - Prob. 3CQ2Ch. 8.4 - Prob. 4CQ2Ch. 8 - Prob. 1IQCh. 8 - Prob. 2IQ
Ch. 8 - Prob. 3IQCh. 8 - Prob. 4IQCh. 8 - Prob. 5IQCh. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Prob. 8HMPCh. 8 - Prob. 9HMPCh. 8 - Prob. 11CTPCh. 8 - Prob. 12CTPCh. 8 - Prob. 13CSQCh. 8 - Prob. 14CSQCh. 8 - Prob. 15CSQCh. 8 - Prob. 16CSQCh. 8 - Prob. 17MLMCh. 8 - Prob. 18MLM
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- What are some of the complaints that have been leveled against UEFI during the course of its existence? To which of the objections presented earlier do you respond with an affirmative or negative response?arrow_forwardWhile society expects businesses to be prepared for disasters and to recover using their own resources, it does not appear that individuals are equipped to endure a crisis. Should we expect the government, at any level, to be in charge of catastrophe recovery, whether at the personal or commercial level? If so, why or why not? What kind of concessions would a company have to make if the catastrophe recovery process was handed over to a government agency?arrow_forwardImagine that you are offered a position as an information technology architect at a brand new corporation. Your company's chief executive officer has given the directive to the members of your staff to devise a contingency plan in the event of an unexpected crisis. The company is equipped to carry out the strategy, but it is trying to avoid going over its allotted spending amount. What would your department recommend as a safety net for the CEO, if anything?arrow_forward
- Knowing that over 70% of its IT employees will be eligible to retire in the following three years, a major US city quickly established a strategy to hire young IT specialists and match them with seasoned veterans. For a 20-year period, practically all of their IT systems were constructed in-house, therefore organizational IT expertise was crucial and hard to come by. So, another aspect of crisis management and contingency planning? Wasn't this addressed in an earlier plan or document?arrow_forwardThen, suppose you get a position as an IT architect at a new organization. The company's CEO instructed your team to develop a contingency plan in the case of a calamity. They have adequate resources to complete the task, but they do not want to exceed their budget, thus they are unwilling to do so. What would your department say about the CEO's safety net?arrow_forwardFor an airline, what are its most important assets? What are the minimal computing resources it would need to continue business for a limited period (up to 2 days). What other systems or processes could it use during the period of the disaster?arrow_forward
- When a big city in the United States learned that more than 70% of its information technology professionals would be able to retire within three years, they immediately established a plan to begin bringing in new information technology workers and pairing them with seasoned veterans. It was necessary to have organizational IT knowledge since their information technology systems had been virtually totally developed in-house over a 20-year period, and those required abilities were not accessible on the open market. This suggests that another area of crisis management and disaster preparedness should be addressed. Shouldn't this issue have been addressed in any kind of plan or paper at some point in the past?arrow_forwardSo, let's assume you get a position as an IT architect at a new business. The CEO of the business advised your workers to create a backup plan in case of an emergency. Although they have the means to complete it, they choose not to since they don't want to go over budget. What would your department say about the CEO's safety net?arrow_forwardThe structure of an information technology system might be improved with the assistance of audits and accountability. Please provide an example, if it is at all possible to do so.arrow_forward
- a consulting team has been formed to advise a group of managers who are to review the technology policies for their organizations. They need to be briefed on some of the issues and responsibilities around information systems. The team is not advising them about policies nor making recommendations; their task is just to provide background information about some key issues. Business continuity planning and disaster recovery Customer/client privacy Responses to legal constraints (for example Sarbanes-Oxley and the Patriot Act) Green IT Accessibility Health problems related to computer use The discussions should center around how the team would want to address these concerns.arrow_forwardI am interested in exploring the possibility of ethical dilemmas that system analysts may encounter in their professional practise.arrow_forwardTo what extent does an organization's success or failure depend on its workers' level of job satisfaction?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
9.1.2 Software Development Approaches; Author: EIToppo;https://www.youtube.com/watch?v=Z9znuSQ7Sz8;License: Standard YouTube License, CC-BY