Essentials of MIS (12th Edition)
12th Edition
ISBN: 9780134238241
Author: Kenneth C. Laudon, Jane P. Laudon
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 1RQ
Program Plan Intro
System vulnerability:
- When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
- The information systems in many locations are been interconnected through communication networks.
- The unauthorized access can occur at many access points in network and is not limited to single location.
- The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
- The denial-of-service attacks are launched by intruders to disrupt website operations.
- Internets are vulnerable than internal networks as it is open to everyone.
Expert Solution
Explanation of Solution
Threats against contemporary information systems:
- The common threats against contemporary information systems are shown below:
-
o Technical threats:
- It includes unauthorized access and introducing errors.
-
o Communications:
- It includes tapping of conversations.
- Message alteration, radiation, fraud and theft.
- Denial of service attacks
-
o Corporate Systems:
- Theft of data
- Data copying
- Data Alteration
- Hardware failure
- Software failure
- Power failure
- Natural disasters.
-
o Poor management decisions:
- Poor design of safeguard
- It causes valuable data being lost or destroyed.
-
o Technical threats:
Explanation of Solution
Malware:
- A malware denotes a program that is harmful to a computer user.
- It includes viruses, worms, Trojan horses and spyware programs that gather information without user permission.
- Virus:
- o A program that would replicate itself by being copied.
- o It may initiate copying to another program, document or computer boot sector.
- Worm:
- o It denotes a virus that is self-replicating and does not alter files but resides in active memory.
- o It duplicates itself without human intervention.
- Trojan horse:
-
o A program in which malicious code is contained inside data or
programming that is harmless. - o It is not a virus as it does not replicate, but it denotes a way for other malicious code to be introduced into system.
-
o A program in which malicious code is contained inside data or
Explanation of Solution
Security problems created by hacker:
- A hacker denotes an individual who gains unauthorized access to computer system.
- It does so by finding security protection weakness in websites and computer systems.
- A hacker threatens
computer system security , steals information, damages systems and commits cyber vandalism. - They disrupt, deface or destroy a website or
information system intentionally.
Explanation of Solution
Computer crime with examples:
- A computer crime denotes any violations of criminal law that involves knowledge of computer technology for perpetration, investigation or prosecution.
- It is defined as commission of illegal acts through use of a computer or against computer system.
- The examples with computers as crime targets are shown below:
- o Confidentiality breach for protected computerized data.
- o Unauthorized access to computer systems.
- o Accessing protected computers for committing fraud.
- o Accessing protected computers for causing damage intentionally.
- o Transmission of a program that causes damage to protected computer.
- The examples with computers as instruments of crime are shown below:
- o Trade secrets theft.
- o Defraud schemes.
- o Using threatening mails.
- o Attempt to intercept electronic communication intentionally.
- o Illegal access of stored communications including voice mail and email.
- o Transmission of child pornography using computer.
Explanation of Solution
Identity theft and phishing:
- Identity theft denotes a crime in which personal information pieces are obtained.
- It includes social security number, license number or credit card number to act as behalf of someone else.
- The information might be used for obtaining credit, merchandise or services in name of victim.
- It is a big problem today as internet has made easy for identity thieves to use stolen information.
- The goods could be purchased online without any personal interaction.
- The e-commerce sites become sources for personal information that criminals uses to establish a new identity.
- Phishing denotes setting up fake websites or sending fake mails that look like those from legitimate business.
- It asks users for confidential personal data.
- The user may ask recipients to confirm records by providing social security numbers, credit card information and other personal details.
Explanation of Solution
Security and system reliability problems:
- The employees create financial threats to business. It includes destruction of e-commerce sites, diversion of credit data and personal information.
- Employees has access to privileged information and in presence of weak security procedures, they can check all personal details.
- The system compromise happens when an employee lets coworker use the system.
- Malicious intruders may trick employees into password revealing pretending to be legitimate company members.
- The faulty data could be entered by employees and can introduce errors.
- Information specialists can create software errors while designing and development of new software.
Explanation of Solution
Software defects affect system reliability and security:
- The software could fail to perform well or gives erroneous result because of undetected bugs.
- A control system may fail to carry messages or allow internet access.
- The customers may be wrongly charged due to such failures.
- The business may order more inventory than it requires.
- The bugs or defects caused by incorrect designs denote major quality problems.
- The maintenance of old programs that is caused by changes in organization,
system design flaws and software complexity denotes a problem. - The small bugs in middle of complex programs may create serious issues in testing.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
A summary on computer crime, viruses, and worms.
Nearly a decade has passed sinuce the
National Academy of Engineers declared
Cyber Security a "grand challenge for the
next century." Every day there is news on
ways in which cyber security challenges
and responses are complicating every
aspect of our lives. Can the challenge be
solved? (40marks)
As a first step to solving any problem, one
must understand its nature. So, it is
important for all cyber security analysts to
keep on top of news stories in the field. In
this discussion forum we will do just that
with the hope that everyone will make it a
daily habit throughout their career.
Today, some cyber news has been flooded
out of the headlines by Hurricane Harvey,
but as noted in this article, cyber concerns
are front and center as students return to
school.
How has the Reauthorized USA PATRIOT Act of 2006 changed the legal definitions of terrorism and responded to critiques against the original law?
Chapter 8 Solutions
Essentials of MIS (12th Edition)
Knowledge Booster
Similar questions
- • What are some of the flaws with usernames and passwords? • What standards are recommended to overcome these flaws with usernames and passwords? • What concerns do you have with your own passwords and will you make a change? • How can new advanced hacking methods be used to bypass enhanced credential safety standards, such as MFA?arrow_forward1arrow_forward4arrow_forward
- Introduce system intrusion detection and prevention.arrow_forwardExist multiple varieties of malicious software? What distinguishes worms from viruses in terms of their destructive potential? Trojan horses have the potential to spread malware such as viruses and worms.arrow_forwardIn this article, not only are the origins and effects of cyberbullying, but also the many proposed remedies, examined at length.arrow_forward
- Are there any differences between Trojan Horse, computer virus, and worm that you could explain? Thanks. There are some types of viruses that are notorious for using techniques that are designed to evade detection.arrow_forwardLegislation imposes limitations on safeguarding confidential information, whereas ethical principles offer direction on how to accomplish this task in a morally appropriate fashion. Privacy What are your opinions or perspectives on the matter at hand?arrow_forward3. What is a computer virus? What is a worm?arrow_forward
- Describe the various types of cyberattacks, such as DDoS attacks, ransomware, and phishing, and outline preventive measures.arrow_forwardHow has hacking evolved since 1950? Given the range of actors evident in the hacker subculture, is it possible that ethical and unethical hackers may share similar motives? If so, what might those motives be, and is it possible to identify an individual’s ethical stance based solely on their motives?arrow_forwardCan cybercrime teach us creative thinking and deductive reasoning?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning