Essentials of MIS (13th Edition)
Essentials of MIS (13th Edition)
13th Edition
ISBN: 9780134802756
Author: Kenneth C. Laudon, Jane Laudon
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem 1RQ
Program Plan Intro

System vulnerability:

  • When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
  • The information systems in many locations are been interconnected through communication networks.
  • The unauthorized access can occur at many access points in network and is not limited to single location.
  • The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
  • The denial-of-service attacks are launched by intruders to disrupt website operations.
  • Internets are vulnerable than internal networks as it is open to everyone.

Explanation of Solution

Malware:

  • A malware denotes a program that is harmful to a computer user.
  • It includes viruses, worms, Trojan horses and spyware programs that gather information without user permission.
  • Virus:
    • o A program that would replicate itself by being copied.
    • o It may initiate copying to another program, document or computer boot sector...

Explanation of Solution

Security problems created by hacker:

  • A hacker denotes an individual who gains unauthorized access to computer system.
  • It does so by finding security protection weakness in websites and computer systems...

Explanation of Solution

Computer crime with examples:

  • A computer crime denotes any violations of criminal law that involves knowledge of computer technology for perpetration, investigation or prosecution.
  • It is defined as commission of illegal acts through use of a computer or against computer system.
  • The examples with computers as crime targets are shown below:
    • o Confidentiality breach for protected computerized data.
    • o Unauthorized access to computer systems.
    • o Accessing protected computers for committing fraud.
    • o Accessing protected computers for causing damage intentionally...

Explanation of Solution

Identity theft and phishing:

  • Identity theft denotes a crime in which personal information pieces are obtained.
  • It includes social security number, license number or credit card number to act as behalf of someone else.
  • The information might be used for obtaining credit, merchandise or services in name of victim.
  • It is a big problem today as internet has made easy for identity thieves to use stolen information.
  • The goods could be purchased online without any personal interaction...

Explanation of Solution

Security and system reliability problems:

  • The employees create financial threats to business. It includes destruction of e-commerce sites, diversion of credit data and personal information.
  • Employees has access to privileged information and in presence of weak security procedures, they can check all personal details.
  • The system compromise happens when an employee lets coworker use the system...

Explanation of Solution

Software defects affect system reliability and security:

  • The software could fail to perform well or gives erroneous result because of undetected bugs.
  • A control system may fail to carry messages or allow internet access.
  • The customers may be wrongly charged due to such failures.
  • The business may order more inventory than it requires...

Blurred answer
Students have asked these similar questions
The Horse table has the following columns: ID - integer, auto increment, primary key RegisteredName - variable-length string Breed - variable-length string Height - decimal number BirthDate - date Delete the following rows: Horse with ID 5 All horses with breed Holsteiner or Paint All horses born before March 13, 2013 To confirm that the deletes are correct, add the SELECT * FROM HORSE; statement.
Why is Linux popular? What would make someone choose a Linux OS over others? What makes a server? How is a server different from a workstation? What considerations do you have to keep in mind when choosing between physical, hybrid, or virtual server and what are the reasons to choose a virtual installation over the other options?
Objective  you will: 1. Implement a Binary Search Tree (BST) from scratch, including the Big Five (Rule of Five)  2. Implement the TreeSort algorithm using a in-order traversal to store sorted elements in a vector. 3. Compare the performance of TreeSort with C++'s std::sort on large datasets. Part 1: Understanding TreeSort How TreeSort Works TreeSort is a comparison-based sorting algorithm that leverages a Binary Search Tree (BST): 1. Insert all elements into a BST (logically sorting them). 2. Traverse the BST in-order to extract elements in sorted order. 3. Store the sorted elements in a vector.  Time Complexity Operation                                Average Case     Worst Case (Unbalanced Tree)Insertion                                     0(1log n)                0 (n)Traversal (Pre-order)                  0(n)                       0 (n)Overall Complexity                  0(n log n)                 0(n^2) (degenerated tree) Note: To improve performance, you could use a…
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning