MANAGEMENT INFORMATION SYSTEMS LOOSELEAF
MANAGEMENT INFORMATION SYSTEMS LOOSELEAF
16th Edition
ISBN: 9780135205518
Author: LAUDON
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem 1RQ
Program Plan Intro

System vulnerability:

  • When huge amount of data is kept in electronic form, it becomes susceptible to many threats.
  • The information systems in many locations are been interconnected through communication networks.
  • The unauthorized access can occur at many access points in network and is not limited to a single location.
  • The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
  • The denial-of-service attacks are launched by intruders to disrupt website operations.
  • Internets are vulnerable than internal networks as it is open to everyone.

Explanation of Solution

Malware:

  • A malware denotes a program that is harmful to a computer user.
  • It includes viruses, worms, Trojan horses and spyware programs that gather information without user permission.

Difference between a virus, a worm, and a Trojan horse:

VirusWormTrojan horse
A program that would replicate itself by being copied...

Explanation of Solution

Hacker:

  • A hacker denotes an individual who gains unauthorized access to computer system.
  • It does so by finding security protection weakness in websites and computer systems...

Explanation of Solution

Computer crime:

  • A computer crime denotes any violations of criminal law that involves knowledge of computer technology for perpetration, investigation or prosecution.
  • It is defined as commission of illegal acts through use of a computer or against computer system.

Examples of crime in which computers are targets:

The examples with computers as crime targets are shown below:

  • Confidentiality breach for protected computerized data.
  • Unauthorized access to computer systems.
  • Accessing protected computers for committing fraud.
  • Accessing protected computers for causing damage intentionally...

Explanation of Solution

Identity theft and phishing:

  • Identity theft denotes a crime in which personal information pieces are obtained.
  • It includes social security number, license number or credit card number to act as behalf of someone else.
  • The information might be used for obtaining credit, merchandise or services in name of victim.
  • It is a big problem today as internet has made easy for identity thieves to use stolen information.
  • The goods could be purchased online without any personal interaction...

Explanation of Solution

Security and system reliability problems created by the employees:

  • The employees create financial threats to business. It includes destruction of e-commerce sites, diversion of credit data and personal information.
  • Employees has access to privileged information and in presence of weak security procedures, they can check all personal details.
  • The system compromise happens when an employee lets coworker use the system...

Explanation of Solution

Software defects affecting system reliability and security:

  • The software could fail to perform well or gives erroneous result because of undetected bugs.
  • A control system may fail to carry messages or allow internet access.
  • The customers may be wrongly charged due to such failures.
  • The business may order more inventory than it requires...

Blurred answer
Students have asked these similar questions
Naive Bayes problem
Question 15
Question 14
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education