
EBK ESSENTIALS OF MIS
12th Edition
ISBN: 8220101459305
Author: LAUDON
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 1RQ
Program Plan Intro
System vulnerability:
- When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
- The information systems in many locations are been interconnected through communication networks.
- The unauthorized access can occur at many access points in network and is not limited to single location.
- The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
- The denial-of-service attacks are launched by intruders to disrupt website operations.
- Internets are vulnerable than internal networks as it is open to everyone.
Expert Solution

Explanation of Solution
Threats against contemporary information systems:
- The common threats against contemporary information systems are shown below:
-
o Technical threats:
- It includes unauthorized access and introducing errors.
-
o Communications:
- It includes tapping of conversations.
- Message alteration, radiation, fraud and theft.
- Denial of service attacks
-
o Corporate Systems:
- Theft of data
- Data copying
- Data Alteration
- Hardware failure
- Software failure
- Power failure
- Natural disasters.
-
o Poor management decisions:
- Poor design of safeguard
- It causes valuable data being lost or destroyed.
-
o Technical threats:
Explanation of Solution
Malware:
- A malware denotes a program that is harmful to a computer user.
- It includes viruses, worms, Trojan horses and spyware programs that gather information without user permission.
- Virus:
- o A program that would replicate itself by being copied.
- o It may initiate copying to another program, document or computer boot sector.
- Worm:
- o It denotes a virus that is self-replicating and does not alter files but resides in active memory.
- o It duplicates itself without human intervention.
- Trojan horse:
-
o A program in which malicious code is contained inside data or
programming that is harmless. - o It is not a virus as it does not replicate, but it denotes a way for other malicious code to be introduced into system.
-
o A program in which malicious code is contained inside data or
Explanation of Solution
Security problems created by hacker:
- A hacker denotes an individual who gains unauthorized access to computer system.
- It does so by finding security protection weakness in websites and computer systems.
- A hacker threatens
computer system security , steals information, damages systems and commits cyber vandalism. - They disrupt, deface or destroy a website or
information system intentionally.
Explanation of Solution
Computer crime with examples:
- A computer crime denotes any violations of criminal law that involves knowledge of computer technology for perpetration, investigation or prosecution.
- It is defined as commission of illegal acts through use of a computer or against computer system.
- The examples with computers as crime targets are shown below:
- o Confidentiality breach for protected computerized data.
- o Unauthorized access to computer systems.
- o Accessing protected computers for committing fraud.
- o Accessing protected computers for causing damage intentionally.
- o Transmission of a program that causes damage to protected computer.
- The examples with computers as instruments of crime are shown below:
- o Trade secrets theft.
- o Defraud schemes.
- o Using threatening mails.
- o Attempt to intercept electronic communication intentionally.
- o Illegal access of stored communications including voice mail and email.
- o Transmission of child pornography using computer.
Explanation of Solution
Identity theft and phishing:
- Identity theft denotes a crime in which personal information pieces are obtained.
- It includes social security number, license number or credit card number to act as behalf of someone else.
- The information might be used for obtaining credit, merchandise or services in name of victim.
- It is a big problem today as internet has made easy for identity thieves to use stolen information.
- The goods could be purchased online without any personal interaction.
- The e-commerce sites become sources for personal information that criminals uses to establish a new identity.
- Phishing denotes setting up fake websites or sending fake mails that look like those from legitimate business.
- It asks users for confidential personal data.
- The user may ask recipients to confirm records by providing social security numbers, credit card information and other personal details.
Explanation of Solution
Security and system reliability problems:
- The employees create financial threats to business. It includes destruction of e-commerce sites, diversion of credit data and personal information.
- Employees has access to privileged information and in presence of weak security procedures, they can check all personal details.
- The system compromise happens when an employee lets coworker use the system.
- Malicious intruders may trick employees into password revealing pretending to be legitimate company members.
- The faulty data could be entered by employees and can introduce errors.
- Information specialists can create software errors while designing and development of new software.
Explanation of Solution
Software defects affect system reliability and security:
- The software could fail to perform well or gives erroneous result because of undetected bugs.
- A control system may fail to carry messages or allow internet access.
- The customers may be wrongly charged due to such failures.
- The business may order more inventory than it requires.
- The bugs or defects caused by incorrect designs denote major quality problems.
- The maintenance of old programs that is caused by changes in organization,
system design flaws and software complexity denotes a problem. - The small bugs in middle of complex programs may create serious issues in testing.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
1.[30 pts] Answer the following questions:
a. [10 pts] Write a Boolean equation in sum-of-products canonical form for the truth table
shown below:
A
B
C
Y
0
0
0
1
0
0
1
0
0
1
0
0
0
1
1
0
1
0
0
1
1
0
1
0
1
1
0
1
1
1
1
0
a. [10 pts] Minimize the Boolean equation you obtained in (a).
b. [10 pts] Implement, using Logisim, the simplified logic circuit. Include an image of
the circuit
In the past, encryption and decryption were mostly done by substitution and permutation of letters in a text message. study those classic cryptographic schemes Then, develop an automatic cipher using Javascript The cipher should be able to perform the following tasks:
generate keys
encrypt a given plaintext message with a key selected from the list of keys generated
decrypt a given ciphertext message with a known cipher key
List reasons why teachers should and shouldn’t be replaced by computers? State your response in a descriptive context. Provide five references from the with internet with your answers.
Knowledge Booster
Similar questions
- The attached picture shows the RTCAPI memory mapped register which has the address 0x180. 1) Program the MCU's registers so that a) SIRC is the clock source b) the clock is divided by 16K c) the clock is enabled d) load is enabledarrow_forwardWhat is the ALU result if the 4-bit ALU Control signal is 0100? What happens if the ALU Control signal is 0101?arrow_forwardIn the past, encryption and decryption were mostly done by substitution and permutation of letters in a text message. study those classic cryptographic schemes Then, develop an automatic cipher using a programming language of your choice. The cipher should be able to perform the following tasks: generate keys encrypt a given plaintext message with a key selected from the list of keys generated decrypt a given ciphertext message with a known cipher keyarrow_forward
- Case Study Instructions: Offshore Wind Energy in the North Sea For this case study, students will analyze the institutional challenges and social rules surrounding offshore wind energy development in the Dutch North Sea, as explored in the case study from the textbook (pages 44-46). Additional resources in this week’s learning module will provide further perspectives on the impact of wind energy on different stakeholders. Students should refer to the syllabus for specific guidelines regarding length, format, and content requirements. Reflection Questions to Consider: What are the key institutional challenges in implementing offshore wind energy in the North Sea? How do formal and informal social rules shape the use of this shared space? What conflicts arise between different stakeholders (e.g., fishermen, naval transport, military, and wind energy developers)? How can policymakers balance economic, environmental, and social considerations when allocating space for wind energy?…arrow_forwardAlphabetic Telephone Number TranslatorMany companies use telephone numbers like 555-GET-FOOD so the number is easier for their customers to remember. On a standard telephone, the alphabetic letters are mapped to numbers in the following fashion: A, B, and C = 2 D, E, and F = 3 G, H, and I = 4 J, K, and L = 5 M, N, and O = 6 P, Q, R, and S = 7 T, U, and V = 8 W, X, Y, and Z = 9 Write a program that asks the user to enter a 10-character telephone number in the format XXX-XXX-XXXX. The application should display the telephone number with any alphabetic characters that appeared in the original translated to their numeric equivalent. For example, if the user enters 555-GET-FOOD, the application should display 555-438-3663.arrow_forwardI would like help to resolve the following casearrow_forward
- 7. Character AnalysisIf you have downloaded the source code you will find a file named text.txt in the Chapter 08 folder. Write a program that reads the file’s contents and determines the following: The number of uppercase letters in the file The number of lowercase letters in the file The number of digits in the file The number of whitespace characters in the filearrow_forwardProvide the full blue terminal commands & output and other things that are usefularrow_forwardHomework You have the row vector (A) that has values from (-100 to 100), write MATLAB codes to: (1) Interchange the first 10 elements with last ten elements. (2) Replace the elements at indices (93,9,17,50) of A with 99. (3) Return the second element and the element before the last of A as a column vector (C1). (4) Extract the first five elements and the last five elements of A and append them as a row vector (R). (5) Set the elements of A with odd indices to zeros(0).arrow_forward
- if the error in a closed-loop Servo motor system is zero, why does the motor Contimac ranning instead of stoppingarrow_forwardWhen the FCC added Color Television to the Industry Standards, they went with the system developed in the 1940s by Peter Goldman for CBS. Question 15 options: True False Part of the reason that many critics disliked 1950s gameshows was the fact that gameshows offered one of the few opportunities to see unscripted interactions with "real" (average/non-famous) people on television. Question 16 options: True False The Andy Griffith Show is an example of the "rural revival" shows that become enormously popular on 1960s American television. Question 19 options: True False During the Network Era, the hours before primetime each day were exclusively devoted to locally-produced programming, not programming dictated by an affiliate station's parent network. Question 20 options: True Falsearrow_forwardAlthough color television was not added to the industry standard until 1956, CBS had been broadcasting selected special events in color as early as 1950. Question 1 options: True False Two key factors in creating the Network Era of American television were the FCC licensing freeze and ______________. Question 4 options: The Quiz Show Scandals Habitual Viewing Operation Frontal Lobes Drop-In Viewing Least Objectionable Programming was designed to embrace the public service-oriented vision of using television to elevate mass culture and enrich viewers. Question 6 options: True False By the end of the 1950s, all three remaining networks (NBC, CBS, & ABC) were broadcasting their entire nightly programming schedule in full color. Question 9 options: True Falsearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning

Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,

Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning

Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning