EBK MANAGEMENT INFORMATION SYSTEMS
16th Edition
ISBN: 9780135192047
Author: LAUDON
Publisher: VST
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 1RQ
Program Plan Intro
System vulnerability:
- When huge amount of data is kept in electronic form, it becomes susceptible to many threats.
- The information systems in many locations are been interconnected through communication networks.
- The unauthorized access can occur at many access points in network and is not limited to a single location.
- The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
- The denial-of-service attacks are launched by intruders to disrupt website operations.
- Internets are vulnerable than internal networks as it is open to everyone.
Explanation of Solution
Malware:
- A malware denotes a program that is harmful to a computer user.
- It includes viruses, worms, Trojan horses and spyware programs that gather information without user permission.
Difference between a virus, a worm, and a Trojan horse:
Virus | Worm | Trojan horse |
A program that would replicate itself by being copied... |
Explanation of Solution
Hacker:
- A hacker denotes an individual who gains unauthorized access to computer system.
- It does so by finding security protection weakness in websites and computer systems...
Explanation of Solution
Computer crime:
- A computer crime denotes any violations of criminal law that involves knowledge of computer technology for perpetration, investigation or prosecution.
- It is defined as commission of illegal acts through use of a computer or against computer system.
Examples of crime in which computers are targets:
The examples with computers as crime targets are shown below:
- Confidentiality breach for protected computerized data.
- Unauthorized access to computer systems.
- Accessing protected computers for committing fraud.
- Accessing protected computers for causing damage intentionally...
Explanation of Solution
Identity theft and phishing:
- Identity theft denotes a crime in which personal information pieces are obtained.
- It includes social security number, license number or credit card number to act as behalf of someone else.
- The information might be used for obtaining credit, merchandise or services in name of victim.
- It is a big problem today as internet has made easy for identity thieves to use stolen information.
- The goods could be purchased online without any personal interaction...
Explanation of Solution
Security and system reliability problems created by the employees:
- The employees create financial threats to business. It includes destruction of e-commerce sites, diversion of credit data and personal information.
- Employees has access to privileged information and in presence of weak security procedures, they can check all personal details.
- The system compromise happens when an employee lets coworker use the system...
Explanation of Solution
Software defects affecting system reliability and security:
- The software could fail to perform well or gives erroneous result because of undetected bugs.
- A control system may fail to carry messages or allow internet access.
- The customers may be wrongly charged due to such failures.
- The business may order more inventory than it requires...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Naive Bayes problem
Question 15
Question 14
Chapter 8 Solutions
EBK MANAGEMENT INFORMATION SYSTEMS
Ch. 8.2 - Prob. 1.1CQCh. 8.2 - Prob. 1.2CQCh. 8.2 - Prob. 1.3CQCh. 8.4 - Prob. 2.1CQCh. 8.4 - Prob. 2.2CQCh. 8.4 - Prob. 2.3CQCh. 8.4 - Prob. 2.4CQCh. 8 - Prob. 1IQCh. 8 - Prob. 2IQCh. 8 - Prob. 3IQ
Ch. 8 - Prob. 4IQCh. 8 - Prob. 5IQCh. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Prob. 8HMPCh. 8 - Prob. 9HMPCh. 8 - Prob. 11HMPCh. 8 - Prob. 12CTPCh. 8 - Prob. 13CSQCh. 8 - Prob. 14CSQCh. 8 - Prob. 15CSQCh. 8 - Prob. 16CSQCh. 8 - Prob. 17MLMCh. 8 - Prob. 18MLM
Knowledge Booster
Similar questions
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education